Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-22543 (GCVE-0-2021-22543)
Vulnerability from cvelistv5
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
 
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux Kernel | Linux Kernel | 
                    
                      
                        
                          Version: add6a0cd1c5ba51b201e1361b05a5df817083618 | 
                  
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:44:14.043Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
          },
          {
            "name": "[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
          },
          {
            "name": "FEDORA-2021-fe826f202e",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/"
          },
          {
            "name": "FEDORA-2021-95f2f1cfc7",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20210708-0002/"
          },
          {
            "name": "[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
          },
          {
            "name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux Kernel",
          "repo": "https://github.com/torvalds/linux",
          "vendor": "Linux Kernel",
          "versions": [
            {
              "lessThan": "f8be156be163a052a067306417cd0ff679068c97",
              "status": "affected",
              "version": "add6a0cd1c5ba51b201e1361b05a5df817083618",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "David Stevens"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Kevin Hamacher"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Jann Horn"
        }
      ],
      "datePublic": "2021-05-17T14:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAn issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.\u003c/p\u003e"
            }
          ],
          "value": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "HIGH",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "LOW",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-15T10:21:33.485Z",
        "orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
        "shortName": "Google"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        },
        {
          "name": "[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
        },
        {
          "name": "FEDORA-2021-fe826f202e",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/"
        },
        {
          "name": "FEDORA-2021-95f2f1cfc7",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20210708-0002/"
        },
        {
          "name": "[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
        },
        {
          "name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Improper memory handling in Linux KVM",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "DATE_PUBLIC": "2021-05-18T10:00:00.000Z",
          "ID": "CVE-2021-22543",
          "STATE": "PUBLIC",
          "TITLE": "Improper memory handling in Linux KVM"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "David Stevens"
          },
          {
            "lang": "eng",
            "value": "Kevin Hamacher"
          },
          {
            "lang": "eng",
            "value": "Jann Horn"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
              "refsource": "MISC",
              "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
            },
            {
              "name": "[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
            },
            {
              "name": "FEDORA-2021-fe826f202e",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/"
            },
            {
              "name": "FEDORA-2021-95f2f1cfc7",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20210708-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20210708-0002/"
            },
            {
              "name": "[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
            },
            {
              "name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
            }
          ]
        },
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
    "assignerShortName": "Google",
    "cveId": "CVE-2021-22543",
    "datePublished": "2021-05-26T10:30:10.775212Z",
    "dateReserved": "2021-01-05T00:00:00",
    "dateUpdated": "2024-09-16T23:26:05.122Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-22543\",\"sourceIdentifier\":\"cve-coordination@google.com\",\"published\":\"2021-05-26T11:15:08.623\",\"lastModified\":\"2024-11-21T05:50:18.270\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema en Linux: KVM mediante del manejo inapropiado de Los vmas VM_IO|VM_PFNMAP en KVM pueden omitir unas comprobaciones RO y puede conllevar a que las p\u00e1ginas sean liberadas mientras el VMM y el invitado a\u00fan pueden acceder a ellas. Esto permite a usuarios con la capacidad de iniciar y controlar una m\u00e1quina virtual leer y escribir p\u00e1ginas aleatorias de memoria y puede resultar en una escalada de privilegios local\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnerableSystemConfidentiality\":\"HIGH\",\"vulnerableSystemIntegrity\":\"HIGH\",\"vulnerableSystemAvailability\":\"LOW\",\"subsequentSystemConfidentiality\":\"HIGH\",\"subsequentSystemIntegrity\":\"HIGH\",\"subsequentSystemAvailability\":\"LOW\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2021-05-18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432E3E22-ACD7-413C-AF97-4DFCFCECE467\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"108A2215-50FB-4074-94CF-C130FA14566D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F0B6C0-F930-480D-962B-3F4EFDCC13C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803BC414-B250-4E3A-A478-A3881340D6B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEB3337-BFDE-462A-908B-176F92053CEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736AEAE9-782B-4F71-9893-DED53367E102\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9B8171-F6CA-427D-81E0-6536D3BBFA8D\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/06/26/1\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/\",\"source\":\"cve-coordination@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/\",\"source\":\"cve-coordination@google.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20210708-0002/\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/06/26/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20210708-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}
  opensuse-su-2021:3876-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).\n- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).\n- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).\n- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).\n- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).\n- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).\n- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).\n- CVE-2021-42252: An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes (bnc#1190479).\n- CVE-2021-41864: prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).\n- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).\n- CVE-2021-3759: Unaccounted ipc objects could have lead to breaking memcg limits and DoS attacks (bsc#1190115).\n- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).\n- CVE-2021-3752: Fixed a use after free vulnerability in the bluetooth module. (bsc#1190023)\n- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)\n- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)\n- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)\n- CVE-2020-12770: An issue was discovered in the Linux kernel sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040 (bnc#1171420).\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2019-3900: An infinite loop issue was found in the vhost_net kernel module, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario (bnc#1133374).\n- CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. (bnc#1129898).\n- CVE-2018-9517: In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108488).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3653: A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \u0027int_ctl\u0027 field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399).\n- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-3679: A lack of CPU resource in the tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#0 bnc#1177666 bnc#1181158).\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).\n- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1190276).\n- CVE-2021-22543: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bnc#1186482 bnc#1190276).\n- CVE-2021-33909: fs/seq_file.c did not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05 (bnc#1188062 bnc#1188063).\n\nThe following non-security bugs were fixed:\n\n- Add arch-dependent support markers in supported.conf (bsc#1186672) \n- Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22913)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22913).\n- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1191888).\n- config: disable unprivileged BPF by default (jsc#SLE-22913)\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).\n- drm: fix spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- gigaset: fix spectre issue in do_data_b3_req (bsc#1192802).\n- hisax: fix spectre issues (bsc#1192802).\n- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).\n- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).\n- hysdn: fix spectre issue in hycapi_send_message (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).\n- iwlwifi: fix spectre issue in iwl_dbgfs_update_pm (bsc#1192802).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec.in: build-id check requires elfutils.\n- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.\n- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- media: dvb_ca_en50221: prevent using slot_info for Spectre attacs (bsc#1192802).\n- media: dvb_ca_en50221: sanity check slot number from userspace (bsc#1192802).\n- media: wl128x: get rid of a potential spectre issue (bsc#1192802).\n- memcg: enable accounting for file lock caches (bsc#1190115).\n- mm/memory.c: do_fault: avoid usage of stale vm_area_struct (bsc#1136513).\n- mpt3sas: fix spectre issues (bsc#1192802).\n- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).\n- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).\n- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).\n- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).\n- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n- net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() (bsc#1192802).\n- NFS: Do uncached readdir when we\u0027re seeking a cookie in an empty page cache (bsc#1191628).\n- objtool: Do not fail on missing symbol table (bsc#1192379).\n- osst: fix spectre issue in osst_verify_frame (bsc#1192802).\n- ovl: check whiteout in ovl_create_over_whiteout() (bsc#1189846).\n- ovl: filter of trusted xattr results in audit (bsc#1189846).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1189846).\n- ovl: initialize error in ovl_copy_xattr (bsc#1189846).\n- ovl: relax WARN_ON() on rename to self (bsc#1189846).\n- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).\n- Revert \u0027memcg: enable accounting for file lock caches (bsc#1190115).\u0027 This reverts commit 912b4421a3e9bb9f0ef1aadc64a436666259bd4d. It\u0027s effectively upstream commit 3754707bcc3e190e5dadc978d172b61e809cb3bd applied to kernel-source (to avoid proliferation of patches). Make a note in blacklist.conf too.\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).\n- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).\n- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).\n- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).\n- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scripts/git_sort/git_sort.py: Update nvme repositories\n- scsi: libfc: Fix array index out of bound exception (bsc#1188616).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1191349).\n- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349 bsc#1191457).\n- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1191349 bsc#1191457).\n- scsi: target: avoid using lun_tg_pt_gp after unlock (bsc#1186078).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sysvipc/sem: mitigate semnum index against spectre v1 (bsc#1192802).\n- target: core: Fix sense key for invalid XCOPY request (bsc#1186078).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- Use /usr/lib/modules as module dir when usermerge is active in the target distro.\n- UsrMerge the kernel (boo#1184804)\n- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-SLE-15.3-2021-3876",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3876-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2021:3876-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2021:3876-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1100416",
        "url": "https://bugzilla.suse.com/1100416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1108488",
        "url": "https://bugzilla.suse.com/1108488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129735",
        "url": "https://bugzilla.suse.com/1129735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129898",
        "url": "https://bugzilla.suse.com/1129898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133374",
        "url": "https://bugzilla.suse.com/1133374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136513",
        "url": "https://bugzilla.suse.com/1136513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171420",
        "url": "https://bugzilla.suse.com/1171420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176724",
        "url": "https://bugzilla.suse.com/1176724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177666",
        "url": "https://bugzilla.suse.com/1177666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181158",
        "url": "https://bugzilla.suse.com/1181158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184673",
        "url": "https://bugzilla.suse.com/1184673"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185726",
        "url": "https://bugzilla.suse.com/1185726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185758",
        "url": "https://bugzilla.suse.com/1185758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185973",
        "url": "https://bugzilla.suse.com/1185973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186078",
        "url": "https://bugzilla.suse.com/1186078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186109",
        "url": "https://bugzilla.suse.com/1186109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186390",
        "url": "https://bugzilla.suse.com/1186390"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186672",
        "url": "https://bugzilla.suse.com/1186672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188062",
        "url": "https://bugzilla.suse.com/1188062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188063",
        "url": "https://bugzilla.suse.com/1188063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188172",
        "url": "https://bugzilla.suse.com/1188172"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188563",
        "url": "https://bugzilla.suse.com/1188563"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188601",
        "url": "https://bugzilla.suse.com/1188601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188616",
        "url": "https://bugzilla.suse.com/1188616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188983",
        "url": "https://bugzilla.suse.com/1188983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188985",
        "url": "https://bugzilla.suse.com/1188985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189057",
        "url": "https://bugzilla.suse.com/1189057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189262",
        "url": "https://bugzilla.suse.com/1189262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189291",
        "url": "https://bugzilla.suse.com/1189291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189399",
        "url": "https://bugzilla.suse.com/1189399"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189400",
        "url": "https://bugzilla.suse.com/1189400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189706",
        "url": "https://bugzilla.suse.com/1189706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189846",
        "url": "https://bugzilla.suse.com/1189846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189884",
        "url": "https://bugzilla.suse.com/1189884"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190023",
        "url": "https://bugzilla.suse.com/1190023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190025",
        "url": "https://bugzilla.suse.com/1190025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190067",
        "url": "https://bugzilla.suse.com/1190067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190115",
        "url": "https://bugzilla.suse.com/1190115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190117",
        "url": "https://bugzilla.suse.com/1190117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190159",
        "url": "https://bugzilla.suse.com/1190159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190276",
        "url": "https://bugzilla.suse.com/1190276"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190349",
        "url": "https://bugzilla.suse.com/1190349"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190351",
        "url": "https://bugzilla.suse.com/1190351"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190479",
        "url": "https://bugzilla.suse.com/1190479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190534",
        "url": "https://bugzilla.suse.com/1190534"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190601",
        "url": "https://bugzilla.suse.com/1190601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190717",
        "url": "https://bugzilla.suse.com/1190717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191193",
        "url": "https://bugzilla.suse.com/1191193"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191315",
        "url": "https://bugzilla.suse.com/1191315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191317",
        "url": "https://bugzilla.suse.com/1191317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191349",
        "url": "https://bugzilla.suse.com/1191349"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191457",
        "url": "https://bugzilla.suse.com/1191457"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191628",
        "url": "https://bugzilla.suse.com/1191628"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191790",
        "url": "https://bugzilla.suse.com/1191790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191800",
        "url": "https://bugzilla.suse.com/1191800"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191888",
        "url": "https://bugzilla.suse.com/1191888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191961",
        "url": "https://bugzilla.suse.com/1191961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192045",
        "url": "https://bugzilla.suse.com/1192045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192267",
        "url": "https://bugzilla.suse.com/1192267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192379",
        "url": "https://bugzilla.suse.com/1192379"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192400",
        "url": "https://bugzilla.suse.com/1192400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192775",
        "url": "https://bugzilla.suse.com/1192775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192781",
        "url": "https://bugzilla.suse.com/1192781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192802",
        "url": "https://bugzilla.suse.com/1192802"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-13405 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-13405/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-9517 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-9517/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3874 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3874/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3900 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3900/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0429 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0429/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12770 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-3702 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-3702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-4788 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-4788/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0941 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0941/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20322 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20322/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-31916 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-31916/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33033 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33033/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33909 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33909/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34556 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34556/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34981 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3542 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3542/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35477 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35477/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3653 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3655 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3656 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3679 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3715 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3715/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37159 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37159/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3732 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3744 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3752 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3753 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3759 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3760 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3764 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3764/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3772 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3772/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40490 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-41864 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-41864/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42008 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42252 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42252/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42739 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42739/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-12-02T07:19:22Z",
      "generator": {
        "date": "2021-12-02T07:19:22Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2021:3876-1",
      "initial_release_date": "2021-12-02T07:19:22Z",
      "revision_history": [
        {
          "date": "2021-12-02T07:19:22Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-default-man-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-vanilla-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-base-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-base-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-debug-base-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-4.12.14-197.102.2.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-vanilla-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-vanilla-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-vanilla-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-13405",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-13405"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-13405",
          "url": "https://www.suse.com/security/cve/CVE-2018-13405"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1100416 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1100416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129735 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1129735"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195161 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1195161"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198702 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1198702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-13405"
    },
    {
      "cve": "CVE-2018-9517",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-9517"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-9517",
          "url": "https://www.suse.com/security/cve/CVE-2018-9517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1108488 for CVE-2018-9517",
          "url": "https://bugzilla.suse.com/1108488"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-9517"
    },
    {
      "cve": "CVE-2019-3874",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3874"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3874",
          "url": "https://www.suse.com/security/cve/CVE-2019-3874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129898 for CVE-2019-3874",
          "url": "https://bugzilla.suse.com/1129898"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3874"
    },
    {
      "cve": "CVE-2019-3900",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3900"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3900",
          "url": "https://www.suse.com/security/cve/CVE-2019-3900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133374 for CVE-2019-3900",
          "url": "https://bugzilla.suse.com/1133374"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-3900"
    },
    {
      "cve": "CVE-2020-0429",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0429"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0429",
          "url": "https://www.suse.com/security/cve/CVE-2020-0429"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176724 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176931 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176931"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188026 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1188026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-0429"
    },
    {
      "cve": "CVE-2020-12770",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12770"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12770",
          "url": "https://www.suse.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171420 for CVE-2020-12770",
          "url": "https://bugzilla.suse.com/1171420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12770"
    },
    {
      "cve": "CVE-2020-3702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-3702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-3702",
          "url": "https://www.suse.com/security/cve/CVE-2020-3702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191193 for CVE-2020-3702",
          "url": "https://bugzilla.suse.com/1191193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191529 for CVE-2020-3702",
          "url": "https://bugzilla.suse.com/1191529"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-3702"
    },
    {
      "cve": "CVE-2020-4788",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-4788"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-4788",
          "url": "https://www.suse.com/security/cve/CVE-2020-4788"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177666 for CVE-2020-4788",
          "url": "https://bugzilla.suse.com/1177666"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1181158 for CVE-2020-4788",
          "url": "https://bugzilla.suse.com/1181158"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-4788"
    },
    {
      "cve": "CVE-2021-0941",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0941"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0941",
          "url": "https://www.suse.com/security/cve/CVE-2021-0941"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192045 for CVE-2021-0941",
          "url": "https://bugzilla.suse.com/1192045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192048 for CVE-2021-0941",
          "url": "https://bugzilla.suse.com/1192048"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0941"
    },
    {
      "cve": "CVE-2021-20322",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20322"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20322",
          "url": "https://www.suse.com/security/cve/CVE-2021-20322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191790 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1191790"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191813 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1191813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193290 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1193290"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-20322"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-31916",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-31916"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-31916",
          "url": "https://www.suse.com/security/cve/CVE-2021-31916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192781 for CVE-2021-31916",
          "url": "https://bugzilla.suse.com/1192781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-31916"
    },
    {
      "cve": "CVE-2021-33033",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33033"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33033",
          "url": "https://www.suse.com/security/cve/CVE-2021-33033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186109 for CVE-2021-33033",
          "url": "https://bugzilla.suse.com/1186109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186283 for CVE-2021-33033",
          "url": "https://bugzilla.suse.com/1186283"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-33033",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33909",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33909"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33909",
          "url": "https://www.suse.com/security/cve/CVE-2021-33909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188062 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188063 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188063"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188257 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189302 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1189302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190859 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1190859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-34556",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34556"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34556",
          "url": "https://www.suse.com/security/cve/CVE-2021-34556"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188983 for CVE-2021-34556",
          "url": "https://bugzilla.suse.com/1188983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-34556"
    },
    {
      "cve": "CVE-2021-34981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34981",
          "url": "https://www.suse.com/security/cve/CVE-2021-34981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191961 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1191961"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192595 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1192595"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212298 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1212298"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-34981"
    },
    {
      "cve": "CVE-2021-3542",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3542"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3542",
          "url": "https://www.suse.com/security/cve/CVE-2021-3542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184673 for CVE-2021-3542",
          "url": "https://bugzilla.suse.com/1184673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186063 for CVE-2021-3542",
          "url": "https://bugzilla.suse.com/1186063"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3542"
    },
    {
      "cve": "CVE-2021-35477",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35477"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35477",
          "url": "https://www.suse.com/security/cve/CVE-2021-35477"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188985 for CVE-2021-35477",
          "url": "https://bugzilla.suse.com/1188985"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-35477"
    },
    {
      "cve": "CVE-2021-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3640",
          "url": "https://www.suse.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188172 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188613 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191530 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1191530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3640"
    },
    {
      "cve": "CVE-2021-3653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3653",
          "url": "https://www.suse.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189399 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189399"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189420 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3655",
          "url": "https://www.suse.com/security/cve/CVE-2021-3655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188563 for CVE-2021-3655",
          "url": "https://bugzilla.suse.com/1188563"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3655"
    },
    {
      "cve": "CVE-2021-3656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3656",
          "url": "https://www.suse.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189400 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189418 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189418"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-3679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3679",
          "url": "https://www.suse.com/security/cve/CVE-2021-3679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189057 for CVE-2021-3679",
          "url": "https://bugzilla.suse.com/1189057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3679"
    },
    {
      "cve": "CVE-2021-3715",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3715"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3715",
          "url": "https://www.suse.com/security/cve/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190349 for CVE-2021-3715",
          "url": "https://bugzilla.suse.com/1190349"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190350 for CVE-2021-3715",
          "url": "https://bugzilla.suse.com/1190350"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-3715",
          "url": "https://bugzilla.suse.com/1196722"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3715"
    },
    {
      "cve": "CVE-2021-37159",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37159"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37159",
          "url": "https://www.suse.com/security/cve/CVE-2021-37159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188601 for CVE-2021-37159",
          "url": "https://bugzilla.suse.com/1188601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37159"
    },
    {
      "cve": "CVE-2021-3732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3732",
          "url": "https://www.suse.com/security/cve/CVE-2021-3732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189706 for CVE-2021-3732",
          "url": "https://bugzilla.suse.com/1189706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3732"
    },
    {
      "cve": "CVE-2021-3744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3744",
          "url": "https://www.suse.com/security/cve/CVE-2021-3744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3744"
    },
    {
      "cve": "CVE-2021-3752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3752",
          "url": "https://www.suse.com/security/cve/CVE-2021-3752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190023 for CVE-2021-3752",
          "url": "https://bugzilla.suse.com/1190023"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190432 for CVE-2021-3752",
          "url": "https://bugzilla.suse.com/1190432"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3752"
    },
    {
      "cve": "CVE-2021-3753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3753",
          "url": "https://www.suse.com/security/cve/CVE-2021-3753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190025 for CVE-2021-3753",
          "url": "https://bugzilla.suse.com/1190025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3753"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    },
    {
      "cve": "CVE-2021-3759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3759",
          "url": "https://www.suse.com/security/cve/CVE-2021-3759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190115 for CVE-2021-3759",
          "url": "https://bugzilla.suse.com/1190115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3759"
    },
    {
      "cve": "CVE-2021-3760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3760",
          "url": "https://www.suse.com/security/cve/CVE-2021-3760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190067 for CVE-2021-3760",
          "url": "https://bugzilla.suse.com/1190067"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3760"
    },
    {
      "cve": "CVE-2021-3764",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3764"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3764",
          "url": "https://www.suse.com/security/cve/CVE-2021-3764"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3764",
          "url": "https://bugzilla.suse.com/1190534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194518 for CVE-2021-3764",
          "url": "https://bugzilla.suse.com/1194518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3764"
    },
    {
      "cve": "CVE-2021-3772",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3772"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3772",
          "url": "https://www.suse.com/security/cve/CVE-2021-3772"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190351 for CVE-2021-3772",
          "url": "https://bugzilla.suse.com/1190351"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3772"
    },
    {
      "cve": "CVE-2021-38160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38160",
          "url": "https://www.suse.com/security/cve/CVE-2021-38160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190117 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190118 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-38160"
    },
    {
      "cve": "CVE-2021-38198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38198",
          "url": "https://www.suse.com/security/cve/CVE-2021-38198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189262 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189278 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-38198"
    },
    {
      "cve": "CVE-2021-38204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38204",
          "url": "https://www.suse.com/security/cve/CVE-2021-38204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189291 for CVE-2021-38204",
          "url": "https://bugzilla.suse.com/1189291"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38204"
    },
    {
      "cve": "CVE-2021-40490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40490",
          "url": "https://www.suse.com/security/cve/CVE-2021-40490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190159 for CVE-2021-40490",
          "url": "https://bugzilla.suse.com/1190159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192775 for CVE-2021-40490",
          "url": "https://bugzilla.suse.com/1192775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-40490"
    },
    {
      "cve": "CVE-2021-41864",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-41864"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-41864",
          "url": "https://www.suse.com/security/cve/CVE-2021-41864"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191317 for CVE-2021-41864",
          "url": "https://bugzilla.suse.com/1191317"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191318 for CVE-2021-41864",
          "url": "https://bugzilla.suse.com/1191318"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-41864"
    },
    {
      "cve": "CVE-2021-42008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42008",
          "url": "https://www.suse.com/security/cve/CVE-2021-42008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191315 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1191315"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191660 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1191660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42008"
    },
    {
      "cve": "CVE-2021-42252",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42252"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42252",
          "url": "https://www.suse.com/security/cve/CVE-2021-42252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190479 for CVE-2021-42252",
          "url": "https://bugzilla.suse.com/1190479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192444 for CVE-2021-42252",
          "url": "https://bugzilla.suse.com/1192444"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42252"
    },
    {
      "cve": "CVE-2021-42739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
          "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42739",
          "url": "https://www.suse.com/security/cve/CVE-2021-42739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184673 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1184673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192036 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1192036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
            "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42739"
    }
  ]
}
  opensuse-su-2021:2645-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2021-3609: Fixed a potential local privilege escalation in the  CAN BCM networking protocol (bsc#1187215).\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw in the joystick devices subsystem. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2021-35039: Fixed mishandling of signature verification. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bsc#1188080).\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: DPTF: Fix reading of attributes (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: PM / fan: Put fan device IDs into separate header file (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: firewire-motu: fix detection for S/PDIF source on optical interface in v2 protocol (git-fixes).\n- ALSA: firewire-motu: fix stream format for MOTU 8pre FireWire (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Apply LED fixup for HP Dragonfly G1, too (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: hda/realtek: Fix pop noise and 2 Front Mic issues on a machine (git-fixes).\n- ALSA: hda/realtek: Improve fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 830 G8 Notebook PC (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook x360 830 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 450 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 630 G8 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: hda: intel-dsp-cfg: add missing ElkhartLake PCI ID (git-fixes).\n- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: pcm - fix mmap capability check for the snd-dummy driver (git-fixes).\n- ALSA: pcm: Call substream ack() method upon compat mmap commit (git-fixes).\n- ALSA: pcm: Fix mmap capability check (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: Add missing proc text entry for BESPOKEN type (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).\n- ALSA: usb-audio: Fix OOB access at proc output (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- ALSA: usx2y: Avoid camelCase (git-fixes).\n- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).\n- ASoC: Intel: sof_sdw: add SOF_RT715_DAI_ID_FIX for AlderLake (git-fixes).\n- ASoC: Intel: sof_sdw: add mutual exclusion between PCH DMIC and RT715 (git-fixes).\n- ASoC: SOF: loader: Use snd_sof_dsp_block_read() instead sof_block_read() (git-fixes).\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: fsl_spdif: Fix error handler with pm_runtime_enable (git-fixes).\n- ASoC: fsl_spdif: Fix unexpected interrupt after suspend (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).\n- ASoC: intel/boards: add missing MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: max98373-sdw: add missing memory allocation check (git-fixes).\n- ASoC: max98373-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rk3328: fix missing clk_disable_unprepare() on error in rk3328_platform_probe() (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ASoC: rt1308-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).\n- ASoC: rt5682-sdw: set regcache_cache_only false before reading RT5682_DEVICE_ID (git-fixes).\n- ASoC: rt5682-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt5682: Disable irq on shutdown (git-fixes).\n- ASoC: rt5682: Fix a problem with error handling in the io init function of the soundwire (git-fixes).\n- ASoC: rt5682: fix getting the wrong device id when the suspend_stress_test (git-fixes).\n- ASoC: rt700-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt711-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt715-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: soc-pcm: fix the return value in dpcm_apply_symmetry() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- ASoC: wm_adsp: Correct wm_coeff_tlv_get handling (git-fixes).\n- Bluetooth: Fix alt settings for incoming SCO with transparent coding format (git-fixes).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: L2CAP: Fix invalid access if ECRED Reconfigure fails (git-fixes).\n- Bluetooth: L2CAP: Fix invalid access on ECRED Connection response (git-fixes).\n- Bluetooth: Remove spurious error message (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btintel: Add infrastructure to read controller information (bsc#1188893).\n- Bluetooth: btintel: Check firmware version before download (bsc#1188893).\n- Bluetooth: btintel: Collect tlv based active firmware build info in FW mode (bsc#1188893).\n- Bluetooth: btintel: Consolidate intel_version parsing (bsc#1188893).\n- Bluetooth: btintel: Consolidate intel_version_tlv parsing (bsc#1188893).\n- Bluetooth: btintel: Fix endianness issue for TLV version information (bsc#1188893).\n- Bluetooth: btintel: Fix offset calculation boot address parameter (bsc#1188893).\n- Bluetooth: btintel: Functions to send firmware header / payload (bsc#1188893).\n- Bluetooth: btintel: Move operational checks after version check (bsc#1188893).\n- Bluetooth: btintel: Refactor firmware download function (bsc#1188893).\n- Bluetooth: btintel: Reorganized bootloader mode tlv checks in intel_version_tlv parsing (bsc#1188893).\n- Bluetooth: btintel: Replace zero-length array with flexible-array member (bsc#1188893).\n- Bluetooth: btintel: Skip reading firmware file version while in bootloader mode (bsc#1188893).\n- Bluetooth: btqca: Do not modify firmware contents in-place (git-fixes).\n- Bluetooth: btusb: Add *setup* function for new generation Intel controllers (bsc#1188893).\n- Bluetooth: btusb: Add support USB ALT 3 for WBS (git-fixes).\n- Bluetooth: btusb: Add support for GarfieldPeak controller (bsc#1188893).\n- Bluetooth: btusb: Consolidate code for waiting firmware download (bsc#1188893).\n- Bluetooth: btusb: Define a function to construct firmware filename (bsc#1188893).\n- Bluetooth: btusb: Enable MSFT extension for Intel controllers (bsc#1188893).\n- Bluetooth: btusb: Fix failing to init controllers with operation firmware (bsc#1188893).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: btusb: Helper function to download firmware to Intel adapters (bsc#1188893).\n- Bluetooth: btusb: Map Typhoon peak controller to BTUSB_INTEL_NEWGEN (bsc#1188893).\n- Bluetooth: btusb: Update boot parameter specific to SKU (bsc#1188893).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Bluetooth: btusb: print firmware file name on error loading firmware (bsc#1188893).\n- Bluetooth: hci_intel: drop strange le16_to_cpu() against u8 values (bsc#1188893).\n- Bluetooth: hci_intel: enable on new platform (bsc#1188893).\n- Bluetooth: hci_intel: switch to list_for_each_entry() (bsc#1188893).\n- Bluetooth: hci_qca: fix potential GPF (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- Bluetooth: mgmt: Fix the command returns garbage parameter value (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).\n- KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available (bsc#1188703).\n- KVM: nVMX: Consult only the \u0027basic\u0027 exit reason when routing nested exit (bsc#1188773).\n- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).\n- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: intel-gw: Fix INTx enable (git-fixes).\n- PCI: intel-gw: Fix INTx enable (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).\n- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).\n- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).\n- RDMA/cma: Protect RMW with qp_mutex (git-fixes).\n- RDMA/hns: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/mlx4: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/mlx5: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/rtrs-clt: Check if the queue_depth has changed during a reconnection (jsc#SLE-15176).\n- RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its stats (jsc#SLE-15176).\n- RDMA/rtrs-clt: Fix memory leak of not-freed sess-\u003estats and stats-\u003epcpu_stats (jsc#SLE-15176).\n- RDMA/rtrs-srv: Fix memory leak of unfreed rtrs_srv_stats object (jsc#SLE-15176).\n- RDMA/rtrs-srv: Fix memory leak when having multiple sessions (jsc#SLE-15176).\n- RDMA/rtrs-srv: Replace atomic_t with percpu_ref for ids_inflight (jsc#SLE-15176).\n- RDMA/rtrs-srv: Set minimal max_send_wr and max_recv_wr (jsc#SLE-15176).\n- RDMA/rtrs: Do not reset hb_missed_max after re-connection (jsc#SLE-15176).\n- RDMA/srp: Fix a recently introduced memory leak (jsc#SLE-15176).\n- Revert \u0027ACPI: resources: Add checks for ACPI IRQ override\u0027 (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027Bluetooth: btintel: Fix endianness issue for TLV version information\u0027 (bsc#1188893).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- Revert \u0027be2net: disable bh with spin_lock in be_process_mcc\u0027 (git-fixes).\n- Revert \u0027drm/i915: Propagate errors on awaiting already signaled fences\u0027 (git-fixes).\n- Revert \u0027drm: add a locked version of drm_is_current_master\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- Revert \u0027iwlwifi: remove wide_cmd_header field\u0027 (bsc#1187495).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1184631).\n- bcache: remove bcache device self-defined readahead (bsc#1184631).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: do not disable an already disabled PCI device (git-fixes).\n- bonding: Add struct bond_ipesc to manage SA (bsc#1176447).\n- bonding: disallow setting nested bonding + ipsec offload (bsc#1176447).\n- bonding: fix build issue (git-fixes).\n- bonding: fix incorrect return value of bond_ipsec_offload_ok() (bsc#1176447).\n- bonding: fix null dereference in bond_ipsec_add_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_add_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_del_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_offload_ok() (bsc#1176447).\n- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- brcmfmac: Fix a double-free in brcmf_sdio_bus_reset (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- cadence: force nonlinear buffers to be cloned (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188748).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: imx8mq: remove SYS PLL 1/2 clock gates (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: si5341: Update initialization magic (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- coresight: Propagate symlink failure (git-fixes).\n- coresight: core: Fix use of uninitialized pointer (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: Revert unnecessary patches that fix unreal use-after-free bugs (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix IRQ free race during driver unload (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).\n- docs: virt/kvm: close inline string literal (bsc#1188703).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/dc: Fix a missing check bug in dm_dp_mst_detect() (git-fixes).\n- drm/amd/display: Avoid HDCP over-read and corruption (git-fixes).\n- drm/amd/display: Fix DCN 3.01 DSCCLK validation (git-fixes).\n- drm/amd/display: Fix build warnings (git-fixes).\n- drm/amd/display: Fix off-by-one error in DML (git-fixes).\n- drm/amd/display: Release MST resources on switch from MST to SST (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amd/display: fix HDCP reset sequence on reinitialize (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdgpu: enable sdma0 tmz for Raven/Renoir(V2) (git-fixes).\n- drm/amdgpu: remove unsafe optimization to drop preamble ib (git-fixes).\n- drm/amdgpu: update golden setting for sienna_cichlid (git-fixes).\n- drm/amdgpu: wait for moving fence after pinning (git-fixes).\n- drm/amdkfd: Fix circular lock in nocpsch path (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/amdkfd: fix circular locking on get_wave_state (git-fixes).\n- drm/amdkfd: use allowed domain for vmbo validation (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge/sii8620: fix dependency on extcon (git-fixes).\n- drm/bridge: Fix the stop condition of drm_bridge_chain_pre_enable() (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm/bridge: nwl-dsi: Force a full modeset when crtc_state-\u003eactive is changed to be true (git-fixes).\n- drm/dp_mst: Do not set proposed vcpi directly (git-fixes).\n- drm/gma500: Add the missed drm_gem_object_put() in psb_user_framebuffer_create() (git-fixes).\n- drm/i915/display: Do not zero past infoframes.vsc (git-fixes).\n- drm/i915/gvt: Clear d3_entered on elsp cmd submission (git-fixes).\n- drm/i915/selftests: use vma_lookup() in __igt_mmap() (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm/dpu: Fix sm8250_mdp register length (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/msm: Fix error return code in msm_drm_init() (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/nouveau: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/nouveau: fix dma_address check for CPU/GPU sync (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/panel: nt35510: Do not fail if DSI read fails (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/radeon: Call radeon_suspend_kms() in radeon_pci_shutdown() for Loongson64 (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: cdn-dp: fix sign extension on an int multiply for a u64 result (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/rockchip: lvds: Fix an error handling path (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/scheduler: Fix hang when sched_entity released (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: Fix clock source for VEC PixelValve on BCM2711 (git-fixes).\n- drm/vc4: crtc: Skip the TXP (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/vc4: hdmi: Fix PM reference leak in vc4_hdmi_encoder_pre_crtc_co() (git-fixes).\n- drm/vc4: hdmi: Fix error path of hpd-gpios (git-fixes).\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- drm/vc4: hdmi: Prevent clock unbalance (git-fixes).\n- drm/vc4: txp: Properly set the possible_crtcs mask (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/vmwgfx: Fix cpu updates of coherent multisample surfaces (git-fixes).\n- drm/vmwgfx: Mark a surface gpu-dirty after the SVGA3dCmdDXGenMips command (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- drm: add a locked version of drm_is_current_master (git-fixes).\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm: bridge: add missing word in Analogix help text (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm: rockchip: add missing registers for RK3066 (git-fixes).\n- drm: rockchip: add missing registers for RK3188 (git-fixes).\n- drm: rockchip: set alpha_en to 0 if it is not used (git-fixes).\n- e1000e: Check the PCIm state (git-fixes).\n- e1000e: Fix an error handling path in \u0027e1000_probe()\u0027 (git-fixes).\n- efi/tpm: Differentiate missing and invalid final event log table (bsc#1188036).\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fbmem: Do not delete the mode that is still in use (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).\n- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).\n- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: core: Disable client irq on reboot/shutdown (git-fixes).\n- i2c: designware: Adjust bus_freq_hz when refuse high speed mode set (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).\n- i40e: Fix error handling in i40e_vsi_open (git-fixes).\n- i40e: Fix missing rtnl locking when setting up pf switch (jsc#SLE-13701).\n- i40e: fix PTP on 5Gb links (jsc#SLE-13701).\n- iavf: Fix an error handling path in \u0027iavf_probe()\u0027 (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).\n- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).\n- igb: Fix an error handling path in \u0027igb_probe()\u0027 (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igb: Fix use-after-free error during reset (git-fixes).\n- igc: Fix an error handling path in \u0027igc_probe()\u0027 (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- integrity: use arch_ima_get_secureboot instead of checking EFI_SECURE_BOOT when loading MokListRT (bsc#1188366).\n- intel_th: Wait until port is in reset before programming it (git-fixes).\n- iwl-trans: move dev_cmd_offs, page_offs to a common trans header (bsc#1187495).\n- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_enqueue_hcmd() (git-fixes).\n- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_gen2_enqueue_hcmd() (git-fixes).\n- iwlwifi: acpi: evaluate dsm to disable 5.8GHz channels (bsc#1187495).\n- iwlwifi: acpi: in non acpi compilations remove iwl_sar_geo_init (bsc#1187495).\n- iwlwifi: acpi: prepare SAR profile selection code for multiple sizes (bsc#1187495).\n- iwlwifi: acpi: remove dummy definition of iwl_sar_set_profile() (bsc#1187495).\n- iwlwifi: acpi: rename geo structs to contain versioning (bsc#1187495).\n- iwlwifi: acpi: support ppag table command v2 (bsc#1187495).\n- iwlwifi: add a common struct for all iwl_tx_power_cmd versions (bsc#1187495).\n- iwlwifi: add trans op to set PNVM (bsc#1187495).\n- iwlwifi: align RX status flags with firmware (bsc#1187495).\n- iwlwifi: api: fix u32 -\u003e __le32 (bsc#1187495).\n- iwlwifi: bump FW API to 57 for AX devices (bsc#1187495).\n- iwlwifi: bump FW API to 59 for AX devices (bsc#1187495).\n- iwlwifi: calib: Demote seemingly unintentional kerneldoc header (bsc#1187495).\n- iwlwifi: dbg: Do not touch the tlv data (bsc#1187495).\n- iwlwifi: dbg: add debug host notification (DHN) time point (bsc#1187495).\n- iwlwifi: dbg: add dumping special device memory (bsc#1187495).\n- iwlwifi: dbg: remove IWL_FW_INI_TIME_POINT_WDG_TIMEOUT (bsc#1187495).\n- iwlwifi: do not export acpi functions unnecessarily (bsc#1187495).\n- iwlwifi: dvm: Demote a couple of nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: devices: Fix function documentation formatting issues (bsc#1187495).\n- iwlwifi: dvm: lib: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: rxon: Demote non-conformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: scan: Demote a few nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: sta: Demote a bunch of nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: tx: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: enable twt by default (bsc#1187495).\n- iwlwifi: fix 11ax disabled bit in the regulatory capability flags (bsc#1187495).\n- iwlwifi: fix sar geo table initialization (bsc#1187495).\n- iwlwifi: fw: add default value for iwl_fw_lookup_cmd_ver (bsc#1187495).\n- iwlwifi: fw: move assert descriptor parser to common code (bsc#1187495).\n- iwlwifi: increase PNVM load timeout (bsc#1187495).\n- iwlwifi: iwl-drv: Provide descriptions debugfs dentries (bsc#1187495).\n- iwlwifi: iwl-trans: move tfd to trans layer (bsc#1187495).\n- iwlwifi: move PNVM implementation to common code (bsc#1187495).\n- iwlwifi: move all bus-independent TX functions to common code (bsc#1187495).\n- iwlwifi: move bc_pool to a common trans header (bsc#1187495).\n- iwlwifi: move bc_table_dword to a common trans header (bsc#1187495).\n- iwlwifi: msix: limit max RX queues for 9000 family (bsc#1187495).\n- iwlwifi: mvm: Add FTM initiator RTT smoothing logic (bsc#1187495).\n- iwlwifi: mvm: Do not install CMAC/GMAC key in AP mode (bsc#1187495).\n- iwlwifi: mvm: add PROTECTED_TWT firmware API (bsc#1187495).\n- iwlwifi: mvm: add a get lmac id function (bsc#1187495).\n- iwlwifi: mvm: add an option to add PASN station (bsc#1187495).\n- iwlwifi: mvm: add d3 prints (bsc#1187495).\n- iwlwifi: mvm: add support for new WOWLAN_TSC_RSC_PARAM version (bsc#1187495).\n- iwlwifi: mvm: add support for new version of WOWLAN_TKIP_SETTING_API_S (bsc#1187495).\n- iwlwifi: mvm: add support for range request command ver 11 (bsc#1187495).\n- iwlwifi: mvm: add support for responder dynamic config command version 3 (bsc#1187495).\n- iwlwifi: mvm: assign SAR table revision to the command later (bsc#1187495).\n- iwlwifi: mvm: avoid possible NULL pointer dereference (bsc#1187495).\n- iwlwifi: mvm: clear all scan UIDs (bsc#1187495).\n- iwlwifi: mvm: d3: parse wowlan status version 11 (bsc#1187495).\n- iwlwifi: mvm: d3: support GCMP ciphers (bsc#1187495).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: mvm: do not check if CSA event is running before removing (bsc#1187495).\n- iwlwifi: mvm: do not send a CSA command the firmware does not know (bsc#1187495).\n- iwlwifi: mvm: fix error print when session protection ends (git-fixes).\n- iwlwifi: mvm: fix suspicious rcu usage warnings (bsc#1187495).\n- iwlwifi: mvm: fix the type we use in the PPAG table validity checks (bsc#1187495).\n- iwlwifi: mvm: get number of stations from TLV (bsc#1187495).\n- iwlwifi: mvm: ignore the scan duration parameter (bsc#1187495).\n- iwlwifi: mvm: initiator: add option for adding a PASN responder (bsc#1187495).\n- iwlwifi: mvm: location: set the HLTK when PASN station is added (bsc#1187495).\n- iwlwifi: mvm: ops: Remove unused static struct \u0027iwl_mvm_debug_names\u0027 (bsc#1187495).\n- iwlwifi: mvm: prepare roc_done_wk to work sync (bsc#1187495).\n- iwlwifi: mvm: process ba-notifications also when sta rcu is invalid (bsc#1187495).\n- iwlwifi: mvm: re-enable TX after channel switch (bsc#1187495).\n- iwlwifi: mvm: read and parse SKU ID if available (bsc#1187495).\n- iwlwifi: mvm: remove memset of kek_kck command (bsc#1187495).\n- iwlwifi: mvm: remove redundant log in iwl_mvm_tvqm_enable_txq() (bsc#1187495).\n- iwlwifi: mvm: remove redundant support_umac_log field (bsc#1187495).\n- iwlwifi: mvm: responder: allow to set only the HLTK for an associated station (bsc#1187495).\n- iwlwifi: mvm: ring the doorbell and wait for PNVM load completion (bsc#1187495).\n- iwlwifi: mvm: rs-fw: handle VHT extended NSS capability (bsc#1187495).\n- iwlwifi: mvm: send stored PPAG command instead of local (bsc#1187495).\n- iwlwifi: mvm: set PROTECTED_TWT feature if supported by firmware (bsc#1187495).\n- iwlwifi: mvm: set PROTECTED_TWT in MAC data policy (bsc#1187495).\n- iwlwifi: mvm: set enabled in the PPAG command properly (bsc#1187495).\n- iwlwifi: mvm: stop claiming NL80211_EXT_FEATURE_SET_SCAN_DWELL (bsc#1187495).\n- iwlwifi: mvm: store PPAG enabled/disabled flag properly (bsc#1187495).\n- iwlwifi: mvm: support ADD_STA_CMD_API_S ver 12 (bsc#1187495).\n- iwlwifi: mvm: support more GTK rekeying algorithms (bsc#1187495).\n- iwlwifi: mvm: support new KEK KCK api (bsc#1187495).\n- iwlwifi: mvm: tx: Demote misuse of kernel-doc headers (bsc#1187495).\n- iwlwifi: mvm: use CHECKSUM_COMPLETE (bsc#1187495).\n- iwlwifi: mvm: utils: Fix some doc-rot (bsc#1187495).\n- iwlwifi: pcie: avoid potential PNVM leaks (bsc#1187495).\n- iwlwifi: pcie: do not disable interrupts for reg_lock (bsc#1187495).\n- iwlwifi: pcie: fix context info freeing (git-fixes).\n- iwlwifi: pcie: fix the xtal latency value for a few qu devices (bsc#1187495).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- iwlwifi: pcie: implement set_pnvm op (bsc#1187495).\n- iwlwifi: pcie: make iwl_pcie_txq_update_byte_cnt_tbl bus independent (bsc#1187495).\n- iwlwifi: pcie: properly set LTR workarounds on 22000 devices (bsc#1187495).\n- iwlwifi: phy-ctxt: add new API VER 3 for phy context cmd (bsc#1187495).\n- iwlwifi: pnvm: do not skip everything when not reloading (bsc#1187495).\n- iwlwifi: pnvm: do not try to load after failures (bsc#1187495).\n- iwlwifi: pnvm: increment the pointer before checking the TLV (bsc#1187495).\n- iwlwifi: pnvm: set the PNVM again if it was already loaded (bsc#1187495).\n- iwlwifi: provide gso_type to GSO packets (bsc#1187495).\n- iwlwifi: queue: bail out on invalid freeing (bsc#1187495).\n- iwlwifi: read and parse PNVM file (bsc#1187495).\n- iwlwifi: regulatory: regulatory capabilities api change (bsc#1187495).\n- iwlwifi: remove iwl_validate_sar_geo_profile() export (bsc#1187495).\n- iwlwifi: remove wide_cmd_header field (bsc#1187495).\n- iwlwifi: rs: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: rs: align to new TLC config command API (bsc#1187495).\n- iwlwifi: rs: set RTS protection for all non legacy rates (bsc#1187495).\n- iwlwifi: sta: defer ADDBA transmit in case reclaimed SN != next SN (bsc#1187495).\n- iwlwifi: stats: add new api fields for statistics cmd/ntfy (bsc#1187495).\n- iwlwifi: support REDUCE_TX_POWER_CMD version 6 (bsc#1187495).\n- iwlwifi: support version 3 of GEO_TX_POWER_LIMIT (bsc#1187495).\n- iwlwifi: support version 5 of the alive notification (bsc#1187495).\n- iwlwifi: thermal: support new temperature measurement API (bsc#1187495).\n- iwlwifi: update prph scratch structure to include PNVM data (bsc#1187495).\n- iwlwifi: use correct group for alive notification (bsc#1187495).\n- iwlwifi: wowlan: adapt to wowlan status API version 10 (bsc#1187495).\n- iwlwifi: yoyo: add support for internal buffer allocation in D3 (bsc#1187495).\n- ixgbe: Fix an error handling path in \u0027ixgbe_probe()\u0027 (git-fixes).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- ixgbevf: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).\n- kABI compatibility fix for max98373_priv struct (git-fixes).\n- kABI workaround for btintel symbol changes (bsc#1188893).\n- kABI workaround for intel_th_driver (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kabi/severities: ignore kABI of iwlwifi symbols (bsc#1187495) iwlwifi driver consists of several modules and all exported symbols are internal uses. Let\u0027s ignore kABI checks of those.\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).\n- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: class: The -ENOTSUPP should never be seen by user space (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- mac80211: consider per-CPU statistics if present (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- mac80211: reset profile_periodicity/ema_ap (git-fixes).\n- mac80211_hwsim: add concurrent channels scanning support over virtio (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).\n- misc: alcor_pci: fix inverted branch condition (git-fixes).\n- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mt76: mt7603: set 0 as min coverage_class value (git-fixes).\n- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).\n- mt76: mt7615: fix fixed-rate tx status reporting (git-fixes).\n- mt76: mt7615: increase MCU command timeout (git-fixes).\n- mt76: mt7915: fix IEEE80211_HE_PHY_CAP7_MAX_NC for station mode (git-fixes).\n- mt76: set dma-done flag for flushed descriptors (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mvpp2: suppress warning (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).\n- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).\n- net/sched: act_ct: remove and free nf_table callbacks (jsc#SLE-15172).\n- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).\n- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).\n- net: fec_ptp: fix issue caused by refactor the fec_devtype (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: ipw2x00,iwlegacy,iwlwifi: Remove in_interrupt() from debug macros (bsc#1187495).\n- net: iwlwifi: Remove in_interrupt() from tracing macro (bsc#1187495).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mvpp2: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- net: netdevsim: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).\n- net: phy: fix save wrong speed and duplex problem if autoneg is on (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: phy: realtek: add delay to fix RXC generation issue (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).\n- netfilter: ctnetlink: suspicious RCU usage in ctnetlink_dump_helpinfo (bsc#1176447).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).\n- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- powerpc/stacktrace: Fix spurious \u0027stale\u0027 traces in raise_backtrace_ipi() (bsc#1156395).\n- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).\n- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).\n- prctl: PR_{G,S}ET_IO_FLUSHER to support controlling memory reclaim (bsc#1188752).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).\n- pwm: imx1: Do not disable clocks at device remove time (git-fixes).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).\n- r8152: Fix potential PM refcount imbalance (bsc#1186194).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).\n- rbd: always kick acquire on \u0027acquired\u0027 and \u0027released\u0027 notifications (bsc#1188746).\n- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi6421: Fix getting wrong drvdata (git-fixes).\n- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- replaced with upstream security mitigation cleanup\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- rtw88: 8822c: fix lc calibration timing (git-fixes).\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- scsi: ibmvfc: Fix command state accounting and stale response detection (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial: 8250_pci: Add support for new HPE serial device (git-fixes).\n- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).\n- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- sfp: Fix error handing in sfp_probe() (git-fixes).\n- skbuff: Fix build with SKB extensions disabled (jsc#SLE-15172).\n- skbuff: Release nfct refcount on napi stolen or re-used skbs (jsc#SLE-15172).\n- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: cadence: Correct initialisation of runtime PM again (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121). \n- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).\n- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).\n- thermal/drivers/int340x/processor_thermal: Fix tcc setting (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- thunderbolt: Bond lanes only when dual_link_port != NULL in alloc_dev_default() (git-fixes).\n- timers: Fix get_next_timer_interrupt() with no timers pending (git-fixes)\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify \u0026 fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).\n- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(\u0026port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: update power supply once partner accepts (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).\n- wireless: carl9170: fix LEDS build errors \u0026 warnings (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- xen/events: reset active flag for lateeoi events later (git-fixes).\n- xfrm: Fix xfrm offload fallback fail case (bsc#1176447).\n- xfrm: delete xfrm4_output_finish xfrm6_output_finish declarations (bsc#1176447).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n- xsk: Fix missing validation for skb and unaligned mode (jsc#SLE-13706).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-SLE-15.3-2021-2645",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2645-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2021:2645-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2021:2645-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152472",
        "url": "https://bugzilla.suse.com/1152472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153274",
        "url": "https://bugzilla.suse.com/1153274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155518",
        "url": "https://bugzilla.suse.com/1155518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170511",
        "url": "https://bugzilla.suse.com/1170511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176447",
        "url": "https://bugzilla.suse.com/1176447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179243",
        "url": "https://bugzilla.suse.com/1179243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180092",
        "url": "https://bugzilla.suse.com/1180092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180814",
        "url": "https://bugzilla.suse.com/1180814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184631",
        "url": "https://bugzilla.suse.com/1184631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185308",
        "url": "https://bugzilla.suse.com/1185308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185791",
        "url": "https://bugzilla.suse.com/1185791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186194",
        "url": "https://bugzilla.suse.com/1186194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186206",
        "url": "https://bugzilla.suse.com/1186206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187215",
        "url": "https://bugzilla.suse.com/1187215"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187495",
        "url": "https://bugzilla.suse.com/1187495"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187585",
        "url": "https://bugzilla.suse.com/1187585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188036",
        "url": "https://bugzilla.suse.com/1188036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188080",
        "url": "https://bugzilla.suse.com/1188080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188121",
        "url": "https://bugzilla.suse.com/1188121"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188126",
        "url": "https://bugzilla.suse.com/1188126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188176",
        "url": "https://bugzilla.suse.com/1188176"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188267",
        "url": "https://bugzilla.suse.com/1188267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188268",
        "url": "https://bugzilla.suse.com/1188268"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188269",
        "url": "https://bugzilla.suse.com/1188269"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188323",
        "url": "https://bugzilla.suse.com/1188323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188366",
        "url": "https://bugzilla.suse.com/1188366"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188445",
        "url": "https://bugzilla.suse.com/1188445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188504",
        "url": "https://bugzilla.suse.com/1188504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188683",
        "url": "https://bugzilla.suse.com/1188683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188703",
        "url": "https://bugzilla.suse.com/1188703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188720",
        "url": "https://bugzilla.suse.com/1188720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188746",
        "url": "https://bugzilla.suse.com/1188746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188747",
        "url": "https://bugzilla.suse.com/1188747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188748",
        "url": "https://bugzilla.suse.com/1188748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188752",
        "url": "https://bugzilla.suse.com/1188752"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188770",
        "url": "https://bugzilla.suse.com/1188770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188771",
        "url": "https://bugzilla.suse.com/1188771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188772",
        "url": "https://bugzilla.suse.com/1188772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188773",
        "url": "https://bugzilla.suse.com/1188773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188774",
        "url": "https://bugzilla.suse.com/1188774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188777",
        "url": "https://bugzilla.suse.com/1188777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188893",
        "url": "https://bugzilla.suse.com/1188893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-21781 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-21781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35039 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3609 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3612 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3612/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-10T08:03:32Z",
      "generator": {
        "date": "2021-08-10T08:03:32Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2021:2645-1",
      "initial_release_date": "2021-08-10T08:03:32Z",
      "revision_history": [
        {
          "date": "2021-08-10T08:03:32Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.3.18-38.17.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.3.18-38.17.1.noarch",
                  "product_id": "kernel-devel-azure-5.3.18-38.17.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.3.18-38.17.1.noarch",
                "product": {
                  "name": "kernel-source-azure-5.3.18-38.17.1.noarch",
                  "product_id": "kernel-source-azure-5.3.18-38.17.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "dlm-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "gfs2-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-devel-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-extra-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-optional-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-optional-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-syms-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "kselftests-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "dlm-kmp-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kernel-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kernel-azure-extra-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kernel-azure-optional-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.3.18-38.17.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.3.18-38.17.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.3.18-38.17.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.3.18-38.17.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.3.18-38.17.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-21781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-21781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process\u0027s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-21781",
          "url": "https://www.suse.com/security/cve/CVE-2021-21781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188445 for CVE-2021-21781",
          "url": "https://bugzilla.suse.com/1188445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-21781"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-35039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35039",
          "url": "https://www.suse.com/security/cve/CVE-2021-35039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188080 for CVE-2021-35039",
          "url": "https://bugzilla.suse.com/1188080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188126 for CVE-2021-35039",
          "url": "https://bugzilla.suse.com/1188126"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-35039"
    },
    {
      "cve": "CVE-2021-3609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3609",
          "url": "https://www.suse.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187215 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1187215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188323 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188720 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1196810"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3609"
    },
    {
      "cve": "CVE-2021-3612",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3612"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3612",
          "url": "https://www.suse.com/security/cve/CVE-2021-3612"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187585 for CVE-2021-3612",
          "url": "https://bugzilla.suse.com/1187585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3612"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  opensuse-su-2021:1142-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2021-3659: Fix general protection fault via NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1188842).\n- CVE-2021-22543: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bnc#1186482).\n- CVE-2021-21781: A SIGPAGE information disclosure vulnerability on ARM was fixed (bsc#1188445).\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).\n- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).\n- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).\n- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: seq: Fix racy deletion of subscriber (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).\n- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).\n- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).\n- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).\n- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).\n- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1184631).\n- bcache: remove bcache device self-defined readahead (bsc#1184631).\n- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).\n- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: do not disable an already disabled PCI device (git-fixes).\n- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).\n- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).\n- btrfs: factor out create_chunk() (bsc#1189077).\n- btrfs: factor out decide_stripe_size() (bsc#1189077).\n- btrfs: factor out gather_device_info() (bsc#1189077).\n- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).\n- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).\n- btrfs: handle invalid profile in chunk allocation (bsc#1189077).\n- btrfs: introduce alloc_chunk_ctl (bsc#1189077).\n- btrfs: introduce chunk allocation policy (bsc#1189077).\n- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).\n- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).\n- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).\n- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).\n- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).\n- cadence: force nonlinear buffers to be cloned (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188748).\n- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).\n- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).\n- cifs: constify get_normalized_path() properly (bsc#1185902).\n- cifs: do not cargo-cult strndup() (bsc#1185902).\n- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).\n- cifs: do not send tree disconnect to ipc shares (bsc#1185902).\n- cifs: do not share tcp servers with dfs mounts (bsc#1185902).\n- cifs: do not share tcp sessions of dfs connections (bsc#1185902).\n- cifs: fix check of dfs interlinks (bsc#1185902).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- cifs: fix path comparison and hash calc (bsc#1185902).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).\n- cifs: handle different charsets in dfs cache (bsc#1185902).\n- cifs: keep referral server sessions alive (bsc#1185902).\n- cifs: missing null pointer check in cifs_mount (bsc#1185902).\n- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).\n- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).\n- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).\n- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).\n- cxgb4: fix IRQ free race during driver unload (git-fixes).\n- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- Drop media rtl28xxu fix patch (bsc#1188683)\n- e1000e: Check the PCIm state (git-fixes).\n- e1000e: Fix an error handling path in \u0027e1000_probe()\u0027 (git-fixes).\n- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).\n- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).\n- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).\n- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).\n- gpio: tqmx86: really make IRQ optional (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- i2c: core: Disable client irq on reboot/shutdown (git-fixes).\n- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).\n- i40e: Fix error handling in i40e_vsi_open (git-fixes).\n- iavf: Fix an error handling path in \u0027iavf_probe()\u0027 (git-fixes).\n- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).\n- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).\n- igb: Fix an error handling path in \u0027igb_probe()\u0027 (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igb: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- igc: Fix an error handling path in \u0027igc_probe()\u0027 (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).\n- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).\n- ixgbe: Fix an error handling path in \u0027ixgbe_probe()\u0027 (git-fixes).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)\n- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).\n- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).\n- KVM: nVMX: Consult only the \u0027basic\u0027 exit reason when routing nested exit (bsc#1188773).\n- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).\n- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).\n- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).\n- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).\n- KVM: nVMX: Sync unsync\u0027d vmcs02 state to vmcs12 on migration (bsc#1188783).\n- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).\n- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).\n- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).\n- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).\n- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).\n- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- misc: alcor_pci: fix inverted branch condition (git-fixes).\n- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).\n- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).\n- Move upstreamed patches to sorted section\n- mt76: mt7603: set 0 as min coverage_class value (git-fixes).\n- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).\n- mt76: mt7615: increase MCU command timeout (git-fixes).\n- mt76: set dma-done flag for flushed descriptors (git-fixes).\n- mvpp2: suppress warning (git-fixes).\n- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).\n- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).\n- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).\n- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).\n- net/mlx5: Properly convey driver version to firmware (git-fixes).\n- net: mvpp2: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)\n- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).\n- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).\n- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- powerpc/stacktrace: Fix spurious \u0027stale\u0027 traces in raise_backtrace_ipi() (bsc#1156395).\n- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).\n- pwm: imx1: Do not disable clocks at device remove time (git-fixes).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).\n- r8152: Fix potential PM refcount imbalance (bsc#1186194).\n- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).\n- rbd: always kick acquire on \u0027acquired\u0027 and \u0027released\u0027 notifications (bsc#1188746).\n- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).\n- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).\n- RDMA/cma: Protect RMW with qp_mutex (git-fixes).\n- regulator: hi6421: Fix getting wrong drvdata (git-fixes).\n- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).\n- replaced with upstream security mitigation cleanup\n- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).\n- Revert \u0027ACPI: resources: Add checks for ACPI IRQ override\u0027 (git-fixes).\n- Revert \u0027be2net: disable bh with spin_lock in be_process_mcc\u0027 (git-fixes).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- sfp: Fix error handing in sfp_probe() (git-fixes).\n- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).\n- spi: cadence: Correct initialisation of runtime PM again (git-fixes).\n- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).\n- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).\n- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- Update patches.suse/ibmvnic-account-for-bufs-already-saved-in-indir_buf.patch (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 bsc#1188620 ltc#192221).\n- Update patches.suse/ibmvnic-free-tx_pool-if-tso_pool-alloc-fails.patch (bsc#1085224 ltc#164363 bsc#1188620 ltc#192221).\n- Update patches.suse/ibmvnic-parenthesize-a-check.patch (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes bsc#1188620 ltc#192221).\n- Update patches.suse/ibmvnic-set-ltb-buff-to-NULL-after-freeing.patch (bsc#1094840 ltc#167098 bsc#1188620 ltc#192221).\n- Update patches.suse/Revert-ibmvnic-remove-duplicate-napi_schedule-call-i.patch (bsc#1065729 bsc#1188405 ltc#193509 bsc#1187476 ltc#193646).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).\n- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- xen/events: reset active flag for lateeoi events later (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2021-1142",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1142-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2021:1142-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2021:1142-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153274",
        "url": "https://bugzilla.suse.com/1153274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179243",
        "url": "https://bugzilla.suse.com/1179243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184631",
        "url": "https://bugzilla.suse.com/1184631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185902",
        "url": "https://bugzilla.suse.com/1185902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186194",
        "url": "https://bugzilla.suse.com/1186194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186264",
        "url": "https://bugzilla.suse.com/1186264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188445",
        "url": "https://bugzilla.suse.com/1188445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188504",
        "url": "https://bugzilla.suse.com/1188504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188683",
        "url": "https://bugzilla.suse.com/1188683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188746",
        "url": "https://bugzilla.suse.com/1188746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188747",
        "url": "https://bugzilla.suse.com/1188747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188748",
        "url": "https://bugzilla.suse.com/1188748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188770",
        "url": "https://bugzilla.suse.com/1188770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188771",
        "url": "https://bugzilla.suse.com/1188771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188772",
        "url": "https://bugzilla.suse.com/1188772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188773",
        "url": "https://bugzilla.suse.com/1188773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188774",
        "url": "https://bugzilla.suse.com/1188774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188777",
        "url": "https://bugzilla.suse.com/1188777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188780",
        "url": "https://bugzilla.suse.com/1188780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188781",
        "url": "https://bugzilla.suse.com/1188781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188782",
        "url": "https://bugzilla.suse.com/1188782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188783",
        "url": "https://bugzilla.suse.com/1188783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188784",
        "url": "https://bugzilla.suse.com/1188784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188786",
        "url": "https://bugzilla.suse.com/1188786"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188787",
        "url": "https://bugzilla.suse.com/1188787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188788",
        "url": "https://bugzilla.suse.com/1188788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188790",
        "url": "https://bugzilla.suse.com/1188790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188842",
        "url": "https://bugzilla.suse.com/1188842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189021",
        "url": "https://bugzilla.suse.com/1189021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189057",
        "url": "https://bugzilla.suse.com/1189057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189077",
        "url": "https://bugzilla.suse.com/1189077"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 802154",
        "url": "https://bugzilla.suse.com/802154"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-21781 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-21781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3679 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-10T17:32:52Z",
      "generator": {
        "date": "2021-08-10T17:32:52Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2021:1142-1",
      "initial_release_date": "2021-08-10T17:32:52Z",
      "revision_history": [
        {
          "date": "2021-08-10T17:32:52Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.3.18-lp152.87.1.noarch",
                "product": {
                  "name": "kernel-devel-5.3.18-lp152.87.1.noarch",
                  "product_id": "kernel-devel-5.3.18-lp152.87.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-5.3.18-lp152.87.1.noarch",
                "product": {
                  "name": "kernel-docs-5.3.18-lp152.87.1.noarch",
                  "product_id": "kernel-docs-5.3.18-lp152.87.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-5.3.18-lp152.87.1.noarch",
                "product": {
                  "name": "kernel-docs-html-5.3.18-lp152.87.1.noarch",
                  "product_id": "kernel-docs-html-5.3.18-lp152.87.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.3.18-lp152.87.1.noarch",
                "product": {
                  "name": "kernel-macros-5.3.18-lp152.87.1.noarch",
                  "product_id": "kernel-macros-5.3.18-lp152.87.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.3.18-lp152.87.1.noarch",
                "product": {
                  "name": "kernel-source-5.3.18-lp152.87.1.noarch",
                  "product_id": "kernel-source-5.3.18-lp152.87.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
                  "product_id": "kernel-source-vanilla-5.3.18-lp152.87.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-debug-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-debug-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-debug-devel-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-default-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-default-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
                "product": {
                  "name": "kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
                  "product_id": "kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-default-devel-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-kvmsmall-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-obs-build-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-obs-qa-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-preempt-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-preempt-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-preempt-devel-5.3.18-lp152.87.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-lp152.87.1.x86_64",
                "product": {
                  "name": "kernel-syms-5.3.18-lp152.87.1.x86_64",
                  "product_id": "kernel-syms-5.3.18-lp152.87.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.2",
                "product": {
                  "name": "openSUSE Leap 15.2",
                  "product_id": "openSUSE Leap 15.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-debug-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64"
        },
        "product_reference": "kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-lp152.87.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-lp152.87.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-lp152.87.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-lp152.87.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-html-5.3.18-lp152.87.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch"
        },
        "product_reference": "kernel-docs-html-5.3.18-lp152.87.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-lp152.87.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-lp152.87.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-lp152.87.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-lp152.87.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-5.3.18-lp152.87.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch"
        },
        "product_reference": "kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-lp152.87.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-lp152.87.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-21781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-21781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process\u0027s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-21781",
          "url": "https://www.suse.com/security/cve/CVE-2021-21781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188445 for CVE-2021-21781",
          "url": "https://bugzilla.suse.com/1188445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T17:32:52Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-21781"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T17:32:52Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T17:32:52Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-3679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3679",
          "url": "https://www.suse.com/security/cve/CVE-2021-3679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189057 for CVE-2021-3679",
          "url": "https://bugzilla.suse.com/1189057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T17:32:52Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3679"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.87.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.87.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.87.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T17:32:52Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  opensuse-su-2021:2687-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2021-3609: Fixed a potential local privilege escalation in the  CAN BCM networking protocol (bsc#1187215).\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw in the joystick devices subsystem. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2021-35039: Fixed mishandling of signature verification. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bsc#1188080).\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: DPTF: Fix reading of attributes (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: PM / fan: Put fan device IDs into separate header file (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: firewire-motu: fix detection for S/PDIF source on optical interface in v2 protocol (git-fixes).\n- ALSA: firewire-motu: fix stream format for MOTU 8pre FireWire (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Apply LED fixup for HP Dragonfly G1, too (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: hda/realtek: Fix pop noise and 2 Front Mic issues on a machine (git-fixes).\n- ALSA: hda/realtek: Improve fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 830 G8 Notebook PC (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook x360 830 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 450 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 630 G8 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: hda: intel-dsp-cfg: add missing ElkhartLake PCI ID (git-fixes).\n- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: pcm - fix mmap capability check for the snd-dummy driver (git-fixes).\n- ALSA: pcm: Call substream ack() method upon compat mmap commit (git-fixes).\n- ALSA: pcm: Fix mmap capability check (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: Add missing proc text entry for BESPOKEN type (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).\n- ALSA: usb-audio: Fix OOB access at proc output (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- ALSA: usx2y: Avoid camelCase (git-fixes).\n- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).\n- ASoC: Intel: sof_sdw: add SOF_RT715_DAI_ID_FIX for AlderLake (git-fixes).\n- ASoC: Intel: sof_sdw: add mutual exclusion between PCH DMIC and RT715 (git-fixes).\n- ASoC: SOF: loader: Use snd_sof_dsp_block_read() instead sof_block_read() (git-fixes).\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: fsl_spdif: Fix error handler with pm_runtime_enable (git-fixes).\n- ASoC: fsl_spdif: Fix unexpected interrupt after suspend (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).\n- ASoC: intel/boards: add missing MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: max98373-sdw: add missing memory allocation check (git-fixes).\n- ASoC: max98373-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rk3328: fix missing clk_disable_unprepare() on error in rk3328_platform_probe() (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ASoC: rt1308-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).\n- ASoC: rt5682-sdw: set regcache_cache_only false before reading RT5682_DEVICE_ID (git-fixes).\n- ASoC: rt5682-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt5682: Disable irq on shutdown (git-fixes).\n- ASoC: rt5682: Fix a problem with error handling in the io init function of the soundwire (git-fixes).\n- ASoC: rt5682: fix getting the wrong device id when the suspend_stress_test (git-fixes).\n- ASoC: rt700-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt711-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt715-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: soc-pcm: fix the return value in dpcm_apply_symmetry() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- ASoC: wm_adsp: Correct wm_coeff_tlv_get handling (git-fixes).\n- Bluetooth: Fix alt settings for incoming SCO with transparent coding format (git-fixes).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: L2CAP: Fix invalid access if ECRED Reconfigure fails (git-fixes).\n- Bluetooth: L2CAP: Fix invalid access on ECRED Connection response (git-fixes).\n- Bluetooth: Remove spurious error message (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btintel: Add infrastructure to read controller information (bsc#1188893).\n- Bluetooth: btintel: Check firmware version before download (bsc#1188893).\n- Bluetooth: btintel: Collect tlv based active firmware build info in FW mode (bsc#1188893).\n- Bluetooth: btintel: Consolidate intel_version parsing (bsc#1188893).\n- Bluetooth: btintel: Consolidate intel_version_tlv parsing (bsc#1188893).\n- Bluetooth: btintel: Fix endianness issue for TLV version information (bsc#1188893).\n- Bluetooth: btintel: Fix offset calculation boot address parameter (bsc#1188893).\n- Bluetooth: btintel: Functions to send firmware header / payload (bsc#1188893).\n- Bluetooth: btintel: Move operational checks after version check (bsc#1188893).\n- Bluetooth: btintel: Refactor firmware download function (bsc#1188893).\n- Bluetooth: btintel: Reorganized bootloader mode tlv checks in intel_version_tlv parsing (bsc#1188893).\n- Bluetooth: btintel: Replace zero-length array with flexible-array member (bsc#1188893).\n- Bluetooth: btintel: Skip reading firmware file version while in bootloader mode (bsc#1188893).\n- Bluetooth: btqca: Do not modify firmware contents in-place (git-fixes).\n- Bluetooth: btusb: Add *setup* function for new generation Intel controllers (bsc#1188893).\n- Bluetooth: btusb: Add support USB ALT 3 for WBS (git-fixes).\n- Bluetooth: btusb: Add support for GarfieldPeak controller (bsc#1188893).\n- Bluetooth: btusb: Consolidate code for waiting firmware download (bsc#1188893).\n- Bluetooth: btusb: Define a function to construct firmware filename (bsc#1188893).\n- Bluetooth: btusb: Enable MSFT extension for Intel controllers (bsc#1188893).\n- Bluetooth: btusb: Fix failing to init controllers with operation firmware (bsc#1188893).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: btusb: Helper function to download firmware to Intel adapters (bsc#1188893).\n- Bluetooth: btusb: Map Typhoon peak controller to BTUSB_INTEL_NEWGEN (bsc#1188893).\n- Bluetooth: btusb: Update boot parameter specific to SKU (bsc#1188893).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Bluetooth: btusb: print firmware file name on error loading firmware (bsc#1188893).\n- Bluetooth: hci_intel: drop strange le16_to_cpu() against u8 values (bsc#1188893).\n- Bluetooth: hci_intel: enable on new platform (bsc#1188893).\n- Bluetooth: hci_intel: switch to list_for_each_entry() (bsc#1188893).\n- Bluetooth: hci_qca: fix potential GPF (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- Bluetooth: mgmt: Fix the command returns garbage parameter value (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).\n- KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available (bsc#1188703).\n- KVM: nVMX: Consult only the \u0027basic\u0027 exit reason when routing nested exit (bsc#1188773).\n- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).\n- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: intel-gw: Fix INTx enable (git-fixes).\n- PCI: intel-gw: Fix INTx enable (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).\n- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).\n- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).\n- RDMA/cma: Protect RMW with qp_mutex (git-fixes).\n- RDMA/hns: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/mlx4: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/mlx5: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/rtrs-clt: Check if the queue_depth has changed during a reconnection (jsc#SLE-15176).\n- RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its stats (jsc#SLE-15176).\n- RDMA/rtrs-clt: Fix memory leak of not-freed sess-\u003estats and stats-\u003epcpu_stats (jsc#SLE-15176).\n- RDMA/rtrs-srv: Fix memory leak of unfreed rtrs_srv_stats object (jsc#SLE-15176).\n- RDMA/rtrs-srv: Fix memory leak when having multiple sessions (jsc#SLE-15176).\n- RDMA/rtrs-srv: Replace atomic_t with percpu_ref for ids_inflight (jsc#SLE-15176).\n- RDMA/rtrs-srv: Set minimal max_send_wr and max_recv_wr (jsc#SLE-15176).\n- RDMA/rtrs: Do not reset hb_missed_max after re-connection (jsc#SLE-15176).\n- RDMA/srp: Fix a recently introduced memory leak (jsc#SLE-15176).\n- Revert \u0027ACPI: resources: Add checks for ACPI IRQ override\u0027 (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027Bluetooth: btintel: Fix endianness issue for TLV version information\u0027 (bsc#1188893).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- Revert \u0027be2net: disable bh with spin_lock in be_process_mcc\u0027 (git-fixes).\n- Revert \u0027drm/i915: Propagate errors on awaiting already signaled fences\u0027 (git-fixes).\n- Revert \u0027drm: add a locked version of drm_is_current_master\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- Revert \u0027iwlwifi: remove wide_cmd_header field\u0027 (bsc#1187495).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1184631).\n- bcache: remove bcache device self-defined readahead (bsc#1184631).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: do not disable an already disabled PCI device (git-fixes).\n- bonding: Add struct bond_ipesc to manage SA (bsc#1176447).\n- bonding: disallow setting nested bonding + ipsec offload (bsc#1176447).\n- bonding: fix build issue (git-fixes).\n- bonding: fix incorrect return value of bond_ipsec_offload_ok() (bsc#1176447).\n- bonding: fix null dereference in bond_ipsec_add_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_add_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_del_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_offload_ok() (bsc#1176447).\n- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- brcmfmac: Fix a double-free in brcmf_sdio_bus_reset (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- cadence: force nonlinear buffers to be cloned (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188748).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: imx8mq: remove SYS PLL 1/2 clock gates (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: si5341: Update initialization magic (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- coresight: Propagate symlink failure (git-fixes).\n- coresight: core: Fix use of uninitialized pointer (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix IRQ free race during driver unload (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).\n- docs: virt/kvm: close inline string literal (bsc#1188703).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/dc: Fix a missing check bug in dm_dp_mst_detect() (git-fixes).\n- drm/amd/display: Avoid HDCP over-read and corruption (git-fixes).\n- drm/amd/display: Fix DCN 3.01 DSCCLK validation (git-fixes).\n- drm/amd/display: Fix build warnings (git-fixes).\n- drm/amd/display: Fix off-by-one error in DML (git-fixes).\n- drm/amd/display: Release MST resources on switch from MST to SST (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Update scaling settings on modeset (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amd/display: fix HDCP reset sequence on reinitialize (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdgpu: enable sdma0 tmz for Raven/Renoir(V2) (git-fixes).\n- drm/amdgpu: remove unsafe optimization to drop preamble ib (git-fixes).\n- drm/amdgpu: update golden setting for sienna_cichlid (git-fixes).\n- drm/amdgpu: wait for moving fence after pinning (git-fixes).\n- drm/amdkfd: Fix circular lock in nocpsch path (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/amdkfd: fix circular locking on get_wave_state (git-fixes).\n- drm/amdkfd: use allowed domain for vmbo validation (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge/sii8620: fix dependency on extcon (git-fixes).\n- drm/bridge: Fix the stop condition of drm_bridge_chain_pre_enable() (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm/bridge: nwl-dsi: Force a full modeset when crtc_state-\u003eactive is changed to be true (git-fixes).\n- drm/dp_mst: Do not set proposed vcpi directly (git-fixes).\n- drm/gma500: Add the missed drm_gem_object_put() in psb_user_framebuffer_create() (git-fixes).\n- drm/i915/display: Do not zero past infoframes.vsc (git-fixes).\n- drm/i915/gvt: Clear d3_entered on elsp cmd submission (git-fixes).\n- drm/i915/selftests: use vma_lookup() in __igt_mmap() (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm/dpu: Fix sm8250_mdp register length (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/msm: Fix error return code in msm_drm_init() (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/nouveau: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/nouveau: fix dma_address check for CPU/GPU sync (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/panel: nt35510: Do not fail if DSI read fails (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/radeon: Call radeon_suspend_kms() in radeon_pci_shutdown() for Loongson64 (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: cdn-dp: fix sign extension on an int multiply for a u64 result (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/rockchip: lvds: Fix an error handling path (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/scheduler: Fix hang when sched_entity released (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: Fix clock source for VEC PixelValve on BCM2711 (git-fixes).\n- drm/vc4: crtc: Skip the TXP (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/vc4: hdmi: Fix PM reference leak in vc4_hdmi_encoder_pre_crtc_co() (git-fixes).\n- drm/vc4: hdmi: Fix error path of hpd-gpios (git-fixes).\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- drm/vc4: hdmi: Prevent clock unbalance (git-fixes).\n- drm/vc4: txp: Properly set the possible_crtcs mask (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/vmwgfx: Fix cpu updates of coherent multisample surfaces (git-fixes).\n- drm/vmwgfx: Mark a surface gpu-dirty after the SVGA3dCmdDXGenMips command (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- drm: add a locked version of drm_is_current_master (git-fixes).\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm: bridge: add missing word in Analogix help text (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm: rockchip: add missing registers for RK3066 (git-fixes).\n- drm: rockchip: add missing registers for RK3188 (git-fixes).\n- drm: rockchip: set alpha_en to 0 if it is not used (git-fixes).\n- e1000e: Check the PCIm state (git-fixes).\n- e1000e: Fix an error handling path in \u0027e1000_probe()\u0027 (git-fixes).\n- efi/tpm: Differentiate missing and invalid final event log table (bsc#1188036).\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fbmem: Do not delete the mode that is still in use (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).\n- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).\n- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: core: Disable client irq on reboot/shutdown (git-fixes).\n- i2c: designware: Adjust bus_freq_hz when refuse high speed mode set (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).\n- i40e: Fix error handling in i40e_vsi_open (git-fixes).\n- i40e: Fix missing rtnl locking when setting up pf switch (jsc#SLE-13701).\n- i40e: fix PTP on 5Gb links (jsc#SLE-13701).\n- iavf: Fix an error handling path in \u0027iavf_probe()\u0027 (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).\n- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).\n- igb: Fix an error handling path in \u0027igb_probe()\u0027 (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igb: Fix use-after-free error during reset (git-fixes).\n- igc: Fix an error handling path in \u0027igc_probe()\u0027 (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- integrity: use arch_ima_get_secureboot instead of checking EFI_SECURE_BOOT when loading MokListRT (bsc#1188366).\n- intel_th: Wait until port is in reset before programming it (git-fixes).\n- iwl-trans: move dev_cmd_offs, page_offs to a common trans header (bsc#1187495).\n- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_enqueue_hcmd() (git-fixes).\n- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_gen2_enqueue_hcmd() (git-fixes).\n- iwlwifi: acpi: evaluate dsm to disable 5.8GHz channels (bsc#1187495).\n- iwlwifi: acpi: in non acpi compilations remove iwl_sar_geo_init (bsc#1187495).\n- iwlwifi: acpi: prepare SAR profile selection code for multiple sizes (bsc#1187495).\n- iwlwifi: acpi: remove dummy definition of iwl_sar_set_profile() (bsc#1187495).\n- iwlwifi: acpi: rename geo structs to contain versioning (bsc#1187495).\n- iwlwifi: acpi: support ppag table command v2 (bsc#1187495).\n- iwlwifi: add a common struct for all iwl_tx_power_cmd versions (bsc#1187495).\n- iwlwifi: add trans op to set PNVM (bsc#1187495).\n- iwlwifi: align RX status flags with firmware (bsc#1187495).\n- iwlwifi: api: fix u32 -\u003e __le32 (bsc#1187495).\n- iwlwifi: bump FW API to 57 for AX devices (bsc#1187495).\n- iwlwifi: bump FW API to 59 for AX devices (bsc#1187495).\n- iwlwifi: calib: Demote seemingly unintentional kerneldoc header (bsc#1187495).\n- iwlwifi: dbg: Do not touch the tlv data (bsc#1187495).\n- iwlwifi: dbg: add debug host notification (DHN) time point (bsc#1187495).\n- iwlwifi: dbg: add dumping special device memory (bsc#1187495).\n- iwlwifi: dbg: remove IWL_FW_INI_TIME_POINT_WDG_TIMEOUT (bsc#1187495).\n- iwlwifi: do not export acpi functions unnecessarily (bsc#1187495).\n- iwlwifi: dvm: Demote a couple of nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: devices: Fix function documentation formatting issues (bsc#1187495).\n- iwlwifi: dvm: lib: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: rxon: Demote non-conformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: scan: Demote a few nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: sta: Demote a bunch of nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: tx: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: enable twt by default (bsc#1187495).\n- iwlwifi: fix 11ax disabled bit in the regulatory capability flags (bsc#1187495).\n- iwlwifi: fix sar geo table initialization (bsc#1187495).\n- iwlwifi: fw: add default value for iwl_fw_lookup_cmd_ver (bsc#1187495).\n- iwlwifi: fw: move assert descriptor parser to common code (bsc#1187495).\n- iwlwifi: increase PNVM load timeout (bsc#1187495).\n- iwlwifi: iwl-drv: Provide descriptions debugfs dentries (bsc#1187495).\n- iwlwifi: iwl-trans: move tfd to trans layer (bsc#1187495).\n- iwlwifi: move PNVM implementation to common code (bsc#1187495).\n- iwlwifi: move all bus-independent TX functions to common code (bsc#1187495).\n- iwlwifi: move bc_pool to a common trans header (bsc#1187495).\n- iwlwifi: move bc_table_dword to a common trans header (bsc#1187495).\n- iwlwifi: msix: limit max RX queues for 9000 family (bsc#1187495).\n- iwlwifi: mvm: Add FTM initiator RTT smoothing logic (bsc#1187495).\n- iwlwifi: mvm: Do not install CMAC/GMAC key in AP mode (bsc#1187495).\n- iwlwifi: mvm: add PROTECTED_TWT firmware API (bsc#1187495).\n- iwlwifi: mvm: add a get lmac id function (bsc#1187495).\n- iwlwifi: mvm: add an option to add PASN station (bsc#1187495).\n- iwlwifi: mvm: add d3 prints (bsc#1187495).\n- iwlwifi: mvm: add support for new WOWLAN_TSC_RSC_PARAM version (bsc#1187495).\n- iwlwifi: mvm: add support for new version of WOWLAN_TKIP_SETTING_API_S (bsc#1187495).\n- iwlwifi: mvm: add support for range request command ver 11 (bsc#1187495).\n- iwlwifi: mvm: add support for responder dynamic config command version 3 (bsc#1187495).\n- iwlwifi: mvm: assign SAR table revision to the command later (bsc#1187495).\n- iwlwifi: mvm: avoid possible NULL pointer dereference (bsc#1187495).\n- iwlwifi: mvm: clear all scan UIDs (bsc#1187495).\n- iwlwifi: mvm: d3: parse wowlan status version 11 (bsc#1187495).\n- iwlwifi: mvm: d3: support GCMP ciphers (bsc#1187495).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: mvm: do not check if CSA event is running before removing (bsc#1187495).\n- iwlwifi: mvm: do not send a CSA command the firmware does not know (bsc#1187495).\n- iwlwifi: mvm: fix error print when session protection ends (git-fixes).\n- iwlwifi: mvm: fix suspicious rcu usage warnings (bsc#1187495).\n- iwlwifi: mvm: fix the type we use in the PPAG table validity checks (bsc#1187495).\n- iwlwifi: mvm: get number of stations from TLV (bsc#1187495).\n- iwlwifi: mvm: ignore the scan duration parameter (bsc#1187495).\n- iwlwifi: mvm: initiator: add option for adding a PASN responder (bsc#1187495).\n- iwlwifi: mvm: location: set the HLTK when PASN station is added (bsc#1187495).\n- iwlwifi: mvm: ops: Remove unused static struct \u0027iwl_mvm_debug_names\u0027 (bsc#1187495).\n- iwlwifi: mvm: prepare roc_done_wk to work sync (bsc#1187495).\n- iwlwifi: mvm: process ba-notifications also when sta rcu is invalid (bsc#1187495).\n- iwlwifi: mvm: re-enable TX after channel switch (bsc#1187495).\n- iwlwifi: mvm: read and parse SKU ID if available (bsc#1187495).\n- iwlwifi: mvm: remove memset of kek_kck command (bsc#1187495).\n- iwlwifi: mvm: remove redundant log in iwl_mvm_tvqm_enable_txq() (bsc#1187495).\n- iwlwifi: mvm: remove redundant support_umac_log field (bsc#1187495).\n- iwlwifi: mvm: responder: allow to set only the HLTK for an associated station (bsc#1187495).\n- iwlwifi: mvm: ring the doorbell and wait for PNVM load completion (bsc#1187495).\n- iwlwifi: mvm: rs-fw: handle VHT extended NSS capability (bsc#1187495).\n- iwlwifi: mvm: send stored PPAG command instead of local (bsc#1187495).\n- iwlwifi: mvm: set PROTECTED_TWT feature if supported by firmware (bsc#1187495).\n- iwlwifi: mvm: set PROTECTED_TWT in MAC data policy (bsc#1187495).\n- iwlwifi: mvm: set enabled in the PPAG command properly (bsc#1187495).\n- iwlwifi: mvm: stop claiming NL80211_EXT_FEATURE_SET_SCAN_DWELL (bsc#1187495).\n- iwlwifi: mvm: store PPAG enabled/disabled flag properly (bsc#1187495).\n- iwlwifi: mvm: support ADD_STA_CMD_API_S ver 12 (bsc#1187495).\n- iwlwifi: mvm: support more GTK rekeying algorithms (bsc#1187495).\n- iwlwifi: mvm: support new KEK KCK api (bsc#1187495).\n- iwlwifi: mvm: tx: Demote misuse of kernel-doc headers (bsc#1187495).\n- iwlwifi: mvm: use CHECKSUM_COMPLETE (bsc#1187495).\n- iwlwifi: mvm: utils: Fix some doc-rot (bsc#1187495).\n- iwlwifi: pcie: avoid potential PNVM leaks (bsc#1187495).\n- iwlwifi: pcie: do not disable interrupts for reg_lock (bsc#1187495).\n- iwlwifi: pcie: fix context info freeing (git-fixes).\n- iwlwifi: pcie: fix the xtal latency value for a few qu devices (bsc#1187495).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- iwlwifi: pcie: implement set_pnvm op (bsc#1187495).\n- iwlwifi: pcie: make iwl_pcie_txq_update_byte_cnt_tbl bus independent (bsc#1187495).\n- iwlwifi: pcie: properly set LTR workarounds on 22000 devices (bsc#1187495).\n- iwlwifi: phy-ctxt: add new API VER 3 for phy context cmd (bsc#1187495).\n- iwlwifi: pnvm: do not skip everything when not reloading (bsc#1187495).\n- iwlwifi: pnvm: do not try to load after failures (bsc#1187495).\n- iwlwifi: pnvm: increment the pointer before checking the TLV (bsc#1187495).\n- iwlwifi: pnvm: set the PNVM again if it was already loaded (bsc#1187495).\n- iwlwifi: provide gso_type to GSO packets (bsc#1187495).\n- iwlwifi: queue: bail out on invalid freeing (bsc#1187495).\n- iwlwifi: read and parse PNVM file (bsc#1187495).\n- iwlwifi: regulatory: regulatory capabilities api change (bsc#1187495).\n- iwlwifi: remove iwl_validate_sar_geo_profile() export (bsc#1187495).\n- iwlwifi: remove wide_cmd_header field (bsc#1187495).\n- iwlwifi: rs: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: rs: align to new TLC config command API (bsc#1187495).\n- iwlwifi: rs: set RTS protection for all non legacy rates (bsc#1187495).\n- iwlwifi: sta: defer ADDBA transmit in case reclaimed SN != next SN (bsc#1187495).\n- iwlwifi: stats: add new api fields for statistics cmd/ntfy (bsc#1187495).\n- iwlwifi: support REDUCE_TX_POWER_CMD version 6 (bsc#1187495).\n- iwlwifi: support version 3 of GEO_TX_POWER_LIMIT (bsc#1187495).\n- iwlwifi: support version 5 of the alive notification (bsc#1187495).\n- iwlwifi: thermal: support new temperature measurement API (bsc#1187495).\n- iwlwifi: update prph scratch structure to include PNVM data (bsc#1187495).\n- iwlwifi: use correct group for alive notification (bsc#1187495).\n- iwlwifi: wowlan: adapt to wowlan status API version 10 (bsc#1187495).\n- iwlwifi: yoyo: add support for internal buffer allocation in D3 (bsc#1187495).\n- ixgbe: Fix an error handling path in \u0027ixgbe_probe()\u0027 (git-fixes).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- ixgbevf: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).\n- kABI compatibility fix for max98373_priv struct (git-fixes).\n- kABI workaround for btintel symbol changes (bsc#1188893).\n- kABI workaround for intel_th_driver (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kabi/severities: ignore kABI of iwlwifi symbols (bsc#1187495) iwlwifi driver consists of several modules and all exported symbols are internal uses. Let\u0027s ignore kABI checks of those.\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).\n- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: class: The -ENOTSUPP should never be seen by user space (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- mac80211: consider per-CPU statistics if present (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- mac80211: reset profile_periodicity/ema_ap (git-fixes).\n- mac80211_hwsim: add concurrent channels scanning support over virtio (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).\n- misc: alcor_pci: fix inverted branch condition (git-fixes).\n- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mt76: mt7603: set 0 as min coverage_class value (git-fixes).\n- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).\n- mt76: mt7615: fix fixed-rate tx status reporting (git-fixes).\n- mt76: mt7615: increase MCU command timeout (git-fixes).\n- mt76: mt7915: fix IEEE80211_HE_PHY_CAP7_MAX_NC for station mode (git-fixes).\n- mt76: set dma-done flag for flushed descriptors (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mvpp2: suppress warning (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).\n- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).\n- net/sched: act_ct: remove and free nf_table callbacks (jsc#SLE-15172).\n- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).\n- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).\n- net: fec_ptp: fix issue caused by refactor the fec_devtype (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: ipw2x00,iwlegacy,iwlwifi: Remove in_interrupt() from debug macros (bsc#1187495).\n- net: iwlwifi: Remove in_interrupt() from tracing macro (bsc#1187495).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mvpp2: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- net: netdevsim: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).\n- net: phy: fix save wrong speed and duplex problem if autoneg is on (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: phy: realtek: add delay to fix RXC generation issue (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).\n- netfilter: ctnetlink: suspicious RCU usage in ctnetlink_dump_helpinfo (bsc#1176447).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).\n- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- powerpc/stacktrace: Fix spurious \u0027stale\u0027 traces in raise_backtrace_ipi() (bsc#1156395).\n- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).\n- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).\n- prctl: PR_{G,S}ET_IO_FLUSHER to support controlling memory reclaim (bsc#1188752).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).\n- pwm: imx1: Do not disable clocks at device remove time (git-fixes).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).\n- r8152: Fix potential PM refcount imbalance (bsc#1186194).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).\n- rbd: always kick acquire on \u0027acquired\u0027 and \u0027released\u0027 notifications (bsc#1188746).\n- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi6421: Fix getting wrong drvdata (git-fixes).\n- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- replaced with upstream security mitigation cleanup\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- rtw88: 8822c: fix lc calibration timing (git-fixes).\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- scsi: ibmvfc: Fix command state accounting and stale response detection (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial: 8250_pci: Add support for new HPE serial device (git-fixes).\n- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).\n- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- sfp: Fix error handing in sfp_probe() (git-fixes).\n- skbuff: Fix build with SKB extensions disabled (jsc#SLE-15172).\n- skbuff: Release nfct refcount on napi stolen or re-used skbs (jsc#SLE-15172).\n- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: cadence: Correct initialisation of runtime PM again (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).\n- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).\n- thermal/drivers/int340x/processor_thermal: Fix tcc setting (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- thunderbolt: Bond lanes only when dual_link_port != NULL in alloc_dev_default() (git-fixes).\n- timers: Fix get_next_timer_interrupt() with no timers pending (git-fixes)\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify \u0026 fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).\n- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(\u0026port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: update power supply once partner accepts (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).\n- wireless: carl9170: fix LEDS build errors \u0026 warnings (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- xen/events: reset active flag for lateeoi events later (git-fixes).\n- xfrm: Fix xfrm offload fallback fail case (bsc#1176447).\n- xfrm: delete xfrm4_output_finish xfrm6_output_finish declarations (bsc#1176447).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n- xsk: Fix missing validation for skb and unaligned mode (jsc#SLE-13706).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-SLE-15.3-2021-2687",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2687-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2021:2687-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2021:2687-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152472",
        "url": "https://bugzilla.suse.com/1152472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153274",
        "url": "https://bugzilla.suse.com/1153274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155518",
        "url": "https://bugzilla.suse.com/1155518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170511",
        "url": "https://bugzilla.suse.com/1170511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176447",
        "url": "https://bugzilla.suse.com/1176447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179243",
        "url": "https://bugzilla.suse.com/1179243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180092",
        "url": "https://bugzilla.suse.com/1180092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180814",
        "url": "https://bugzilla.suse.com/1180814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184631",
        "url": "https://bugzilla.suse.com/1184631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185308",
        "url": "https://bugzilla.suse.com/1185308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185791",
        "url": "https://bugzilla.suse.com/1185791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186194",
        "url": "https://bugzilla.suse.com/1186194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186206",
        "url": "https://bugzilla.suse.com/1186206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187215",
        "url": "https://bugzilla.suse.com/1187215"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187495",
        "url": "https://bugzilla.suse.com/1187495"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187585",
        "url": "https://bugzilla.suse.com/1187585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188036",
        "url": "https://bugzilla.suse.com/1188036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188080",
        "url": "https://bugzilla.suse.com/1188080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188121",
        "url": "https://bugzilla.suse.com/1188121"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188126",
        "url": "https://bugzilla.suse.com/1188126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188176",
        "url": "https://bugzilla.suse.com/1188176"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188267",
        "url": "https://bugzilla.suse.com/1188267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188268",
        "url": "https://bugzilla.suse.com/1188268"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188269",
        "url": "https://bugzilla.suse.com/1188269"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188323",
        "url": "https://bugzilla.suse.com/1188323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188366",
        "url": "https://bugzilla.suse.com/1188366"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188445",
        "url": "https://bugzilla.suse.com/1188445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188504",
        "url": "https://bugzilla.suse.com/1188504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188683",
        "url": "https://bugzilla.suse.com/1188683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188703",
        "url": "https://bugzilla.suse.com/1188703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188720",
        "url": "https://bugzilla.suse.com/1188720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188746",
        "url": "https://bugzilla.suse.com/1188746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188747",
        "url": "https://bugzilla.suse.com/1188747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188748",
        "url": "https://bugzilla.suse.com/1188748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188752",
        "url": "https://bugzilla.suse.com/1188752"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188770",
        "url": "https://bugzilla.suse.com/1188770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188771",
        "url": "https://bugzilla.suse.com/1188771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188772",
        "url": "https://bugzilla.suse.com/1188772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188773",
        "url": "https://bugzilla.suse.com/1188773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188774",
        "url": "https://bugzilla.suse.com/1188774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188777",
        "url": "https://bugzilla.suse.com/1188777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188893",
        "url": "https://bugzilla.suse.com/1188893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-21781 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-21781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35039 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3609 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3612 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3612/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-14T08:16:56Z",
      "generator": {
        "date": "2021-08-14T08:16:56Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2021:2687-1",
      "initial_release_date": "2021-08-14T08:16:56Z",
      "revision_history": [
        {
          "date": "2021-08-14T08:16:56Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "dlm-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "dlm-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "dlm-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-al-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-al-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-al-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-allwinner-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-allwinner-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-allwinner-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-altera-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-altera-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-altera-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amd-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-amd-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-amd-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amlogic-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-amlogic-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-amlogic-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-apm-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-apm-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-apm-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-arm-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-arm-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-arm-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-broadcom-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-broadcom-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-broadcom-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-cavium-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-cavium-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-cavium-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-exynos-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-exynos-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-exynos-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-freescale-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-freescale-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-freescale-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-hisilicon-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-hisilicon-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-hisilicon-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-lg-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-lg-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-lg-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-marvell-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-marvell-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-marvell-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-mediatek-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-mediatek-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-mediatek-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-nvidia-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-nvidia-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-nvidia-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-qcom-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-qcom-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-qcom-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-renesas-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-renesas-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-renesas-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-rockchip-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-rockchip-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-rockchip-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-socionext-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-socionext-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-socionext-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-sprd-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-sprd-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-sprd-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-xilinx-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-xilinx-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-xilinx-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-zte-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-zte-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-zte-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "gfs2-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "gfs2-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "gfs2-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-extra-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-extra-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-extra-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-optional-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-optional-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-optional-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
                "product": {
                  "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
                  "product_id": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-extra-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-livepatch-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-optional-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-optional-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-obs-build-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-obs-qa-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-extra-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-extra-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-extra-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-optional-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-optional-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-optional-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-syms-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-syms-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "kselftests-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "kselftests-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "kselftests-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-devel-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-devel-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-docs-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-docs-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-docs-html-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-docs-html-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-macros-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-macros-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-source-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-source-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-source-vanilla-5.3.18-59.19.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "dlm-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-debug-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-debug-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-debug-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
                  "product_id": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
                  "product_id": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-extra-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-optional-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-optional-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-kvmsmall-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-obs-build-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-obs-qa-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-syms-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-syms-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "kselftests-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "cluster-md-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "dlm-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "gfs2-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
                "product": {
                  "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
                  "product_id": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
                  "product_id": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-devel-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-devel-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-extra-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-extra-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-livepatch-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-optional-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-optional-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-obs-build-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-obs-build-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-obs-qa-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-syms-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-syms-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-zfcpdump-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "kselftests-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "ocfs2-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "reiserfs-kmp-default-5.3.18-59.19.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "dlm-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "dlm-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "gfs2-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "gfs2-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-debug-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-debug-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-debug-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
                "product": {
                  "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
                  "product_id": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-extra-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-livepatch-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-optional-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-optional-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-kvmsmall-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-obs-build-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-obs-qa-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-extra-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-extra-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-extra-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-optional-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-optional-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-optional-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-syms-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-syms-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "kselftests-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "kselftests-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-64kb-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "dlm-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-preempt-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-preempt-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-al-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-al-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-allwinner-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-allwinner-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-altera-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-altera-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-amd-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-amd-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-amlogic-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-amlogic-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-apm-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-apm-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-arm-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-arm-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-broadcom-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-broadcom-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-cavium-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-cavium-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-exynos-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-exynos-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-freescale-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-freescale-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-hisilicon-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-hisilicon-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-lg-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-lg-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-marvell-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-marvell-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-mediatek-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-mediatek-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-nvidia-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-nvidia-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-qcom-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-qcom-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-renesas-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-renesas-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-rockchip-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-rockchip-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-socionext-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-socionext-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-sprd-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-sprd-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-xilinx-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-xilinx-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-zte-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dtb-zte-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-64kb-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-preempt-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-preempt-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-64kb-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-devel-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-64kb-devel-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-extra-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-64kb-extra-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-optional-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-64kb-optional-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-debug-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-debug-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-debug-devel-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-debug-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64"
        },
        "product_reference": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le"
        },
        "product_reference": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x"
        },
        "product_reference": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64"
        },
        "product_reference": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le"
        },
        "product_reference": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x"
        },
        "product_reference": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64"
        },
        "product_reference": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-default-devel-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-devel-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-default-extra-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-extra-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-extra-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-extra-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-default-optional-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-optional-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-optional-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-optional-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-59.19.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-59.19.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-html-5.3.18-59.19.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-docs-html-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-kvmsmall-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-59.19.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-obs-build-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-obs-build-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-obs-qa-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-obs-qa-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-obs-qa-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-obs-qa-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-preempt-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-extra-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-preempt-extra-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-extra-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-preempt-extra-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-optional-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-preempt-optional-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-optional-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-preempt-optional-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-59.19.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-5.3.18-59.19.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-source-vanilla-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-syms-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-syms-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-zfcpdump-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-64kb-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kselftests-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kselftests-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kselftests-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-preempt-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-preempt-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-59.19.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-21781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-21781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process\u0027s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-21781",
          "url": "https://www.suse.com/security/cve/CVE-2021-21781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188445 for CVE-2021-21781",
          "url": "https://bugzilla.suse.com/1188445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:16:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-21781"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:16:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-35039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35039",
          "url": "https://www.suse.com/security/cve/CVE-2021-35039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188080 for CVE-2021-35039",
          "url": "https://bugzilla.suse.com/1188080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188126 for CVE-2021-35039",
          "url": "https://bugzilla.suse.com/1188126"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:16:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-35039"
    },
    {
      "cve": "CVE-2021-3609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3609",
          "url": "https://www.suse.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187215 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1187215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188323 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188720 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1196810"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:16:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3609"
    },
    {
      "cve": "CVE-2021-3612",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3612"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3612",
          "url": "https://www.suse.com/security/cve/CVE-2021-3612"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187585 for CVE-2021-3612",
          "url": "https://bugzilla.suse.com/1187585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:16:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3612"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:16:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
          "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
          "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:dtb-al-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-altera-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-apm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-arm-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-lg-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:dtb-zte-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
            "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-macros-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-source-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.19.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kernel-syms-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
            "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:16:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  CERTFR-2021-AVI-695
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 16.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 21.04",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 20.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 14.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-38207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38207"
    },
    {
      "name": "CVE-2021-34693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
    },
    {
      "name": "CVE-2020-36311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36311"
    },
    {
      "name": "CVE-2021-38160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-38198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-38200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38200"
    },
    {
      "name": "CVE-2021-38206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38206"
    },
    {
      "name": "CVE-2021-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    },
    {
      "name": "CVE-2020-26541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
    }
  ],
  "initial_release_date": "2021-09-10T00:00:00",
  "last_revision_date": "2021-09-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-695",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement\nde la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5072-1 du 08 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5072-1"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5073-1 du 09 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5073-1"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5071-1 du 08 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5071-1"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5070-1 du 08 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5070-1"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5062-1 du 08 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5062-1"
    }
  ]
}
  CERTFR-2021-AVI-636
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE MicroOS 5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-3659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
    },
    {
      "name": "CVE-2021-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21781"
    }
  ],
  "initial_release_date": "2021-08-18T00:00:00",
  "last_revision_date": "2021-08-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-636",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-08-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212695-1 du 17 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212695-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212746-1 du 17 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212746-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212756-1 du 17 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212756-1/"
    }
  ]
}
  CERTFR-2021-AVI-627
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE MicroOS 5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-3659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21781"
    }
  ],
  "initial_release_date": "2021-08-13T00:00:00",
  "last_revision_date": "2021-08-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-627",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-08-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212678-1 du 12 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212678-1/"
    }
  ]
}
  CERTFR-2021-AVI-717
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 16.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 20.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-36311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36311"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    }
  ],
  "initial_release_date": "2021-09-17T00:00:00",
  "last_revision_date": "2021-09-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-717",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu . Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Le noyau Linux d\u0027Ubuntu USN-5071-2 du 16 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5071-2"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Le noyau Linux d\u0027Ubuntu USN-5073-2 du 17 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5073-2"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Le noyau Linux d\u0027Ubuntu USN-5082-1 du 16 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5082-1"
    }
  ]
}
  CERTFR-2021-AVI-833
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-36385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2019-20934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    }
  ],
  "initial_release_date": "2021-10-29T00:00:00",
  "last_revision_date": "2021-10-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-833",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-10-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3987 du 26 octobre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3987"
    }
  ]
}
  CERTFR-2021-AVI-611
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | 
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    }
  ],
  "initial_release_date": "2021-08-11T00:00:00",
  "last_revision_date": "2021-08-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-611",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-08-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3088 du 10 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3088"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3057 du 10 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3057"
    }
  ]
}
  CERTFR-2022-AVI-916
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Networking versions antérieures à R22.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions antérieures à 3.1.1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.2R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO | ||
| Juniper Networks | N/A | Contrail Networking versions antérieures à 2011.L5 | ||
| Juniper Networks | N/A | Steel Belted Radius Carrier Edition versions antérieures à 8.6.0R16 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à 5.4.7 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions 5.5.x antérieures à 5.5.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions 3.2.x antérieures à 3.2.1 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Paragon Active Assurance (anciennement Netrounds) versions ant\u00e9rieures \u00e0 3.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 22.2R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Contrail Networking versions ant\u00e9rieures \u00e0 2011.L5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Steel Belted Radius Carrier Edition versions ant\u00e9rieures \u00e0 8.6.0R16",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions ant\u00e9rieures \u00e0 5.4.7",
      "product": {
        "name": "Session Smart Router",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions 5.5.x ant\u00e9rieures \u00e0 5.5.3",
      "product": {
        "name": "Session Smart Router",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Paragon Active Assurance (anciennement Netrounds) versions 3.2.x ant\u00e9rieures \u00e0 3.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-1343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
    },
    {
      "name": "CVE-2022-22243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22243"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2020-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-24407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
    },
    {
      "name": "CVE-2021-35586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
    },
    {
      "name": "CVE-2022-22238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22238"
    },
    {
      "name": "CVE-2022-22249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22249"
    },
    {
      "name": "CVE-2021-35550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
    },
    {
      "name": "CVE-2022-22227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22227"
    },
    {
      "name": "CVE-2016-0701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0701"
    },
    {
      "name": "CVE-2021-25220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
    },
    {
      "name": "CVE-2021-35567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
    },
    {
      "name": "CVE-2021-31535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
    },
    {
      "name": "CVE-2021-42574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
    },
    {
      "name": "CVE-2020-27777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
    },
    {
      "name": "CVE-2022-22208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22208"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2017-5929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
    },
    {
      "name": "CVE-2022-22218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
    },
    {
      "name": "CVE-2021-20271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2022-22201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22201"
    },
    {
      "name": "CVE-2020-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
    },
    {
      "name": "CVE-2021-42771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
    },
    {
      "name": "CVE-2021-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
    },
    {
      "name": "CVE-2018-20532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20532"
    },
    {
      "name": "CVE-2022-22246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22246"
    },
    {
      "name": "CVE-2007-6755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
    },
    {
      "name": "CVE-2020-29661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
    },
    {
      "name": "CVE-2022-22250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22250"
    },
    {
      "name": "CVE-2022-22192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22192"
    },
    {
      "name": "CVE-2019-12735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
    },
    {
      "name": "CVE-2022-22239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22239"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-22241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22241"
    },
    {
      "name": "CVE-2020-25212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
    },
    {
      "name": "CVE-2019-2435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2435"
    },
    {
      "name": "CVE-2021-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
    },
    {
      "name": "CVE-2022-22226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22226"
    },
    {
      "name": "CVE-2015-9262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
    },
    {
      "name": "CVE-2021-4160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
    },
    {
      "name": "CVE-2020-24394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
    },
    {
      "name": "CVE-2021-35559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
    },
    {
      "name": "CVE-2021-3573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
    },
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2020-14314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
    },
    {
      "name": "CVE-2021-27364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
    },
    {
      "name": "CVE-2021-35565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
    },
    {
      "name": "CVE-2022-22229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22229"
    },
    {
      "name": "CVE-2018-20534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20534"
    },
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2021-35603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
    },
    {
      "name": "CVE-2021-28165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22225"
    },
    {
      "name": "CVE-2020-12364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2021-3711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
    },
    {
      "name": "CVE-2022-22245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22245"
    },
    {
      "name": "CVE-2022-25314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
    },
    {
      "name": "CVE-2022-0330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2019-1543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
    },
    {
      "name": "CVE-2018-10689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10689"
    },
    {
      "name": "CVE-2016-2124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
    },
    {
      "name": "CVE-2021-27365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2020-27170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
    },
    {
      "name": "CVE-2020-25705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-0847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
    },
    {
      "name": "CVE-2020-14385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
    },
    {
      "name": "CVE-2022-22232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22232"
    },
    {
      "name": "CVE-2019-18282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
    },
    {
      "name": "CVE-2020-12321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
    },
    {
      "name": "CVE-2022-22240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22240"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2019-20811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
    },
    {
      "name": "CVE-2020-12363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
    },
    {
      "name": "CVE-2021-43527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-35588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
    },
    {
      "name": "CVE-2022-22234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22234"
    },
    {
      "name": "CVE-2022-22242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22242"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2022-22251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22251"
    },
    {
      "name": "CVE-2008-5161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
    },
    {
      "name": "CVE-2022-22244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22244"
    },
    {
      "name": "CVE-2019-20934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
    },
    {
      "name": "CVE-2021-29650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2022-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22233"
    },
    {
      "name": "CVE-2021-4155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
    },
    {
      "name": "CVE-2021-45417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
    },
    {
      "name": "CVE-2020-10769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
    },
    {
      "name": "CVE-2018-20533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20533"
    },
    {
      "name": "CVE-2021-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
    },
    {
      "name": "CVE-2020-25656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2022-22224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22224"
    },
    {
      "name": "CVE-2021-20265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-25211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
    },
    {
      "name": "CVE-2022-0492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22247"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2019-0205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-35578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
    },
    {
      "name": "CVE-2020-28374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
    },
    {
      "name": "CVE-2021-0920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
    },
    {
      "name": "CVE-2022-22199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22199"
    },
    {
      "name": "CVE-2021-42550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
    },
    {
      "name": "CVE-2021-3712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
    },
    {
      "name": "CVE-2022-22236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22236"
    },
    {
      "name": "CVE-2020-7053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
    },
    {
      "name": "CVE-2022-22248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22248"
    },
    {
      "name": "CVE-2019-9518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
    },
    {
      "name": "CVE-2022-22220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22220"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    },
    {
      "name": "CVE-2021-35564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-22228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22228"
    },
    {
      "name": "CVE-2021-23840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
    },
    {
      "name": "CVE-2020-14351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14351"
    },
    {
      "name": "CVE-2020-25709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
    },
    {
      "name": "CVE-2022-1434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
    },
    {
      "name": "CVE-2020-25643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
    },
    {
      "name": "CVE-2022-22223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22223"
    },
    {
      "name": "CVE-2020-25645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25645"
    },
    {
      "name": "CVE-2021-35556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
    },
    {
      "name": "CVE-2020-25717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
    },
    {
      "name": "CVE-2021-3765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
    },
    {
      "name": "CVE-2021-41617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2022-24903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2019-1551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
    },
    {
      "name": "CVE-2019-2684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2684"
    },
    {
      "name": "CVE-2021-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0543"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    },
    {
      "name": "CVE-2022-22231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22231"
    },
    {
      "name": "CVE-2021-35561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
    },
    {
      "name": "CVE-2022-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22235"
    },
    {
      "name": "CVE-2020-0427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2022-22211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22211"
    },
    {
      "name": "CVE-2020-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
    },
    {
      "name": "CVE-2022-22230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22230"
    },
    {
      "name": "CVE-2022-22237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22237"
    },
    {
      "name": "CVE-2021-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
    }
  ],
  "initial_release_date": "2022-10-13T00:00:00",
  "last_revision_date": "2022-10-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-916",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-10-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69906",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-might-be-seen-due-to-mac-moves-within-the-same-bridge-domain-CVE-2022-22249"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69885",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-UTM-Enhanced-Content-Filtering-and-AntiVirus-are-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22231"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69888",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69886",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-Unified-Threat-Management-UTM-Enhanced-Content-Filtering-CF-is-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22232"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69899",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69881",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-SBR-Carrier-Multiple-Vulnerabilities-resolved-in-version-8-6-0R16-64-bit-Solaris-and-Linux-editions"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69894",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-process-will-crash-when-a-malformed-incoming-RESV-message-is-processed-CVE-2022-22238"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69898",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-core-upon-receipt-of-a-specific-EVPN-route-by-a-BGP-route-reflector-in-an-EVPN-environment-CVE-2022-22199"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69895",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-The-ssh-CLI-command-always-runs-as-root-which-can-lead-to-privilege-escalation-CVE-2022-22239"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69908",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-cSRX-Series-Storing-Passwords-in-a-Recoverable-Format-and-software-permissions-issues-allows-a-local-attacker-to-elevate-privileges-CVE-2022-22251"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69874",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PPMD-goes-into-infinite-loop-upon-receipt-of-malformed-OSPF-TLV-CVE-2022-22224"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69902",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Due-to-a-race-condition-the-rpd-process-can-crash-upon-receipt-of-a-BGP-update-message-containing-flow-spec-route-CVE-2022-22220"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69879",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-can-occur-due-to-memory-corruption-caused-by-flapping-BGP-sessions-CVE-2022-22208"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69890",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX2300-and-EX3400-Series-One-of-more-SFPs-might-become-unavailable-when-the-system-is-very-busy-CVE-2022-22234"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69875",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-multipath-scenario-when-one-of-the-contributing-routes-is-flapping-often-and-rapidly-rpd-may-crash-CVE-2022-22225"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69915",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-An-attacker-can-cause-a-kernel-panic-by-sending-a-malformed-TCP-packet-to-the-device-CVE-2022-22192"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69878",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Specific-IPv6-transit-traffic-gets-exceptioned-to-the-routing-engine-which-will-cause-increased-CPU-utilization-CVE-2022-22227"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69907",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-FPC-might-crash-and-reload-if-the-EVPN-MAC-entry-is-move-from-local-to-remote-CVE-2022-22250"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69891",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-A-flowd-core-will-be-observed-when-malformed-GPRS-traffic-is-processed-CVE-2022-22235"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69882",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69876",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX4300-MP-EX4600-QFX5000-Series-In-VxLAN-scenarios-specific-packets-processed-cause-a-memory-leak-leading-to-a-PFE-crash-CVE-2022-22226"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69892",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-When-specific-valid-SIP-packets-are-received-the-PFE-will-crash-CVE-2022-22236"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69889",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69887",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-SR-to-LDP-interworking-scenario-with-SRMS-when-a-specific-low-privileged-command-is-issued-on-an-ABR-rpd-will-crash-CVE-2022-22233"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69900",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX5000-Series-with-SPC3-SRX4000-Series-and-vSRX-When-PowerMode-IPsec-is-configured-the-PFE-will-crash-upon-receipt-of-a-malformed-ESP-packet-CVE-2022-22201"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69884",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-specific-OSPFv3-LSAs-CVE-2022-22230"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69901",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Upon-processing-of-a-genuine-packet-the-pkid-process-will-crash-during-CMPv2-auto-re-enrollment-CVE-2022-22218"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69905",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Incorrect-file-permissions-can-allow-low-privileged-user-to-cause-another-user-to-execute-arbitrary-commands-CVE-2022-22248"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69893",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Peers-not-configured-for-TCP-AO-can-establish-a-BGP-or-LDP-session-even-if-authentication-is-configured-locally-CVE-2022-22237"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69904",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Kernel-processing-of-unvalidated-TCP-segments-could-lead-to-a-Denial-of-Service-DoS-CVE-2022-22247"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69880",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-On-IPv6-OAM-SRv6-network-enabled-devices-an-attacker-sending-a-specific-genuine-packet-to-an-IPv6-address-configured-on-the-device-may-cause-a-RPD-memory-leak-leading-to-an-RPD-core-CVE-2022-22228"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69873",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-QFX10000-Series-In-IP-MPLS-PHP-node-scenarios-upon-receipt-of-certain-crafted-packets-multiple-interfaces-in-LAG-configurations-may-detach-CVE-2022-22223"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69896",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-memory-leak-might-be-observed-while-running-a-specific-cli-command-in-a-RIB-sharding-scenario-CVE-2022-22240"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69897",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011-L5"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69916",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-Multiple-FPCs-become-unreachable-due-to-continuous-polling-of-specific-SNMP-OID-CVE-2022-22211"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69883",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Paragon-Active-Assurance-Formerly-Netrounds-Stored-Cross-site-Scripting-XSS-vulnerability-in-web-administration-CVE-2022-22229"
    }
  ]
}
  CERTFR-2021-AVI-934
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | N/A | SUSE MicroOS 5.1 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Server for SAP 12-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE MicroOS 5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud Crowbar 9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE MicroOS 5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud 9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 12-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-20322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
    },
    {
      "name": "CVE-2021-3655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
    },
    {
      "name": "CVE-2020-12770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
    },
    {
      "name": "CVE-2021-34556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
    },
    {
      "name": "CVE-2021-3679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
    },
    {
      "name": "CVE-2020-3702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
    },
    {
      "name": "CVE-2019-3874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
    },
    {
      "name": "CVE-2021-41864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
    },
    {
      "name": "CVE-2021-38204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
    },
    {
      "name": "CVE-2021-3542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3542"
    },
    {
      "name": "CVE-2021-31916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
    },
    {
      "name": "CVE-2021-38160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
    },
    {
      "name": "CVE-2021-3760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
    },
    {
      "name": "CVE-2021-3772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
    },
    {
      "name": "CVE-2021-3753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
    },
    {
      "name": "CVE-2021-3659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
    },
    {
      "name": "CVE-2021-34981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
    },
    {
      "name": "CVE-2021-3759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
    },
    {
      "name": "CVE-2020-27820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
    },
    {
      "name": "CVE-2018-13405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
    },
    {
      "name": "CVE-2021-37159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
    },
    {
      "name": "CVE-2021-40490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-0941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
    },
    {
      "name": "CVE-2021-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
    },
    {
      "name": "CVE-2021-38198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2021-42739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2019-3900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
    },
    {
      "name": "CVE-2021-3764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
    },
    {
      "name": "CVE-2021-42008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
    },
    {
      "name": "CVE-2021-42252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
    },
    {
      "name": "CVE-2021-35477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
    },
    {
      "name": "CVE-2021-3744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
    },
    {
      "name": "CVE-2018-9517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
    },
    {
      "name": "CVE-2020-0429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0429"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    },
    {
      "name": "CVE-2021-43389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
    }
  ],
  "initial_release_date": "2021-12-10T00:00:00",
  "last_revision_date": "2021-12-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-934",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-12-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213979-1 du 10 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213979-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213972-1 du 08 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213972-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213978-1 du 09 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213978-1/"
    }
  ]
}
  CERTFR-2021-AVI-640
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    }
  ],
  "initial_release_date": "2021-08-19T00:00:00",
  "last_revision_date": "2021-08-19T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-640",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-08-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3173 du 17 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3173"
    }
  ]
}
  CERTFR-2021-AVI-969
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Debian 9 (strech) LTS versions antérieures à 4.9.290-1
 - Debian 10 (buster) versions antérieures à 4.19.208-1
 - Debian 11 (bullseye) versions antérieures à 5.10.84-1
 
Pour plus d'informations, veuillez-vous référer à la page de suivi des vulnérabilités de l'éditeur. [1]
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cul\u003e \u003cli\u003eDebian 9 (strech) LTS versions ant\u00e9rieures \u00e0 4.9.290-1\u003c/li\u003e \u003cli\u003eDebian 10 (buster) versions ant\u00e9rieures \u00e0 4.19.208-1\u003c/li\u003e \u003cli\u003eDebian 11 (bullseye) versions ant\u00e9rieures \u00e0 5.10.84-1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003ePour plus d\u0027informations, veuillez-vous r\u00e9f\u00e9rer \u00e0 la page de suivi des vuln\u00e9rabilit\u00e9s de l\u0027\u00e9diteur. [1]\u003c/p\u003e ",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-20322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
    },
    {
      "name": "CVE-2021-20317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
    },
    {
      "name": "CVE-2021-3655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
    },
    {
      "name": "CVE-2021-3816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3816"
    },
    {
      "name": "CVE-2021-3679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
    },
    {
      "name": "CVE-2020-3702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
    },
    {
      "name": "CVE-2021-41864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
    },
    {
      "name": "CVE-2021-38204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
    },
    {
      "name": "CVE-2021-3760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
    },
    {
      "name": "CVE-2021-38199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38199"
    },
    {
      "name": "CVE-2021-3753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
    },
    {
      "name": "CVE-2021-20321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
    },
    {
      "name": "CVE-2021-37159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
    },
    {
      "name": "CVE-2021-40490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
    },
    {
      "name": "CVE-2021-3820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3820"
    },
    {
      "name": "CVE-2021-38198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
    },
    {
      "name": "CVE-2021-4273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4273"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-0920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
    },
    {
      "name": "CVE-2021-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
    },
    {
      "name": "CVE-2021-3732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
    },
    {
      "name": "CVE-2020-16119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
    },
    {
      "name": "CVE-2021-42008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    },
    {
      "name": "CVE-2021-43389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
    }
  ],
  "initial_release_date": "2021-12-20T00:00:00",
  "last_revision_date": "2021-12-20T00:00:00",
  "links": [
    {
      "title": "[1] Page de suivi des vuln\u00e9rabilit\u00e9s",
      "url": "https://security-tracker.debian.org/tracker/source-package/linux"
    }
  ],
  "reference": "CERTFR-2021-AVI-969",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-12-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Debian dla-2843 du 16 d\u00e9cembre 2021",
      "url": "https://www.debian.org/lts/security/2021/dla-2843"
    }
  ]
}
  CERTFR-2021-AVI-612
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 | 
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise High Availability 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    }
  ],
  "initial_release_date": "2021-08-11T00:00:00",
  "last_revision_date": "2021-08-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-612",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-08-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212645-1 du 10 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212645-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212643-1 du 10 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212643-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212644-1 du 10 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212644-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212647-1 du 10 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212647-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212646-1 du 10 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212646-1/"
    }
  ]
}
  CERTFR-2025-AVI-0212
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Manager Proxy 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | N/A | Public Cloud Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Manager Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | SUSE Manager Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Proxy 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Desktop 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Proxy 4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Basesystem Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Public Cloud Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Retail Branch Server 4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Server 4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Legacy Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Retail Branch Server 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Enterprise Storage 7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Server 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Development Tools Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-37159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
    },
    {
      "name": "CVE-2022-2991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2991"
    },
    {
      "name": "CVE-2023-0394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
    },
    {
      "name": "CVE-2022-36280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
    },
    {
      "name": "CVE-2023-1382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
    },
    {
      "name": "CVE-2023-33951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
    },
    {
      "name": "CVE-2023-33952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
    },
    {
      "name": "CVE-2023-1192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
    },
    {
      "name": "CVE-2023-4244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
    },
    {
      "name": "CVE-2023-6606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
    },
    {
      "name": "CVE-2024-24860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
    },
    {
      "name": "CVE-2024-23307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
    },
    {
      "name": "CVE-2024-26810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
    },
    {
      "name": "CVE-2023-52572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
    },
    {
      "name": "CVE-2021-47202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
    },
    {
      "name": "CVE-2024-26931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26931"
    },
    {
      "name": "CVE-2024-27388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
    },
    {
      "name": "CVE-2024-26924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
    },
    {
      "name": "CVE-2024-27054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27054"
    },
    {
      "name": "CVE-2022-48650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48650"
    },
    {
      "name": "CVE-2023-52646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
    },
    {
      "name": "CVE-2024-26929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26929"
    },
    {
      "name": "CVE-2023-52653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
    },
    {
      "name": "CVE-2022-48636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48636"
    },
    {
      "name": "CVE-2024-26930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26930"
    },
    {
      "name": "CVE-2023-52853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52853"
    },
    {
      "name": "CVE-2024-26758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
    },
    {
      "name": "CVE-2024-26943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26943"
    },
    {
      "name": "CVE-2024-36898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
    },
    {
      "name": "CVE-2024-38599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
    },
    {
      "name": "CVE-2024-27397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
    },
    {
      "name": "CVE-2024-26886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26886"
    },
    {
      "name": "CVE-2024-36915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
    },
    {
      "name": "CVE-2024-26708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26708"
    },
    {
      "name": "CVE-2024-40980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40980"
    },
    {
      "name": "CVE-2024-35949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
    },
    {
      "name": "CVE-2024-41055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
    },
    {
      "name": "CVE-2024-42232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
    },
    {
      "name": "CVE-2024-41047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
    },
    {
      "name": "CVE-2024-44974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44974"
    },
    {
      "name": "CVE-2024-45009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45009"
    },
    {
      "name": "CVE-2024-45010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
    },
    {
      "name": "CVE-2024-45019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
    },
    {
      "name": "CVE-2024-46858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46858"
    },
    {
      "name": "CVE-2022-48664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48664"
    },
    {
      "name": "CVE-2022-48953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
    },
    {
      "name": "CVE-2022-48975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48975"
    },
    {
      "name": "CVE-2022-49006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
    },
    {
      "name": "CVE-2024-44934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44934"
    },
    {
      "name": "CVE-2024-49867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
    },
    {
      "name": "CVE-2024-49950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49950"
    },
    {
      "name": "CVE-2024-49963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
    },
    {
      "name": "CVE-2024-49975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2024-50036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50036"
    },
    {
      "name": "CVE-2024-50067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
    },
    {
      "name": "CVE-2024-50251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50251"
    },
    {
      "name": "CVE-2024-50256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50256"
    },
    {
      "name": "CVE-2024-50262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50262"
    },
    {
      "name": "CVE-2024-50278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50278"
    },
    {
      "name": "CVE-2024-50279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2024-50296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50296"
    },
    {
      "name": "CVE-2024-50299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
    },
    {
      "name": "CVE-2024-53055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
    },
    {
      "name": "CVE-2024-53072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
    },
    {
      "name": "CVE-2024-50142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50142"
    },
    {
      "name": "CVE-2024-53241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
    },
    {
      "name": "CVE-2024-53240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
    },
    {
      "name": "CVE-2024-47666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
    },
    {
      "name": "CVE-2024-47701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
    },
    {
      "name": "CVE-2024-49884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
    },
    {
      "name": "CVE-2024-49944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
    },
    {
      "name": "CVE-2024-49952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
    },
    {
      "name": "CVE-2024-50181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
    },
    {
      "name": "CVE-2023-52920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
    },
    {
      "name": "CVE-2024-50115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50115"
    },
    {
      "name": "CVE-2024-50128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
    },
    {
      "name": "CVE-2024-50136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
    },
    {
      "name": "CVE-2024-50154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50154"
    },
    {
      "name": "CVE-2024-50166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
    },
    {
      "name": "CVE-2024-50195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
    },
    {
      "name": "CVE-2024-50210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50210"
    },
    {
      "name": "CVE-2024-50275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2024-53056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
    },
    {
      "name": "CVE-2024-53095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
    },
    {
      "name": "CVE-2024-53101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53101"
    },
    {
      "name": "CVE-2024-53104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
    },
    {
      "name": "CVE-2024-53112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53112"
    },
    {
      "name": "CVE-2024-53114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
    },
    {
      "name": "CVE-2024-53121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53121"
    },
    {
      "name": "CVE-2024-53138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53138"
    },
    {
      "name": "CVE-2024-53142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53142"
    },
    {
      "name": "CVE-2024-47678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
    },
    {
      "name": "CVE-2024-50085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50085"
    },
    {
      "name": "CVE-2024-50143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
    },
    {
      "name": "CVE-2024-50151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50151"
    },
    {
      "name": "CVE-2024-50185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50185"
    },
    {
      "name": "CVE-2024-50199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50199"
    },
    {
      "name": "CVE-2024-50202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
    },
    {
      "name": "CVE-2024-53103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53103"
    },
    {
      "name": "CVE-2024-53113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
    },
    {
      "name": "CVE-2024-53119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53119"
    },
    {
      "name": "CVE-2024-53120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
    },
    {
      "name": "CVE-2024-53122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53122"
    },
    {
      "name": "CVE-2024-53123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
    },
    {
      "name": "CVE-2024-53127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53127"
    },
    {
      "name": "CVE-2024-53129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53129"
    },
    {
      "name": "CVE-2024-53130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53130"
    },
    {
      "name": "CVE-2024-53131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53131"
    },
    {
      "name": "CVE-2024-53135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
    },
    {
      "name": "CVE-2024-53144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
    },
    {
      "name": "CVE-2024-8805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
    },
    {
      "name": "CVE-2024-50018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50018"
    },
    {
      "name": "CVE-2024-50211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
    },
    {
      "name": "CVE-2024-53064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
    },
    {
      "name": "CVE-2024-53090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53090"
    },
    {
      "name": "CVE-2024-53125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53125"
    },
    {
      "name": "CVE-2024-53141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53141"
    },
    {
      "name": "CVE-2024-53146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53146"
    },
    {
      "name": "CVE-2024-53148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53148"
    },
    {
      "name": "CVE-2024-53150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53150"
    },
    {
      "name": "CVE-2024-53151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
    },
    {
      "name": "CVE-2024-53156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
    },
    {
      "name": "CVE-2024-53157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53157"
    },
    {
      "name": "CVE-2024-53158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53158"
    },
    {
      "name": "CVE-2024-53161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53161"
    },
    {
      "name": "CVE-2024-53162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53162"
    },
    {
      "name": "CVE-2024-53166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
    },
    {
      "name": "CVE-2024-53169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
    },
    {
      "name": "CVE-2024-53171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53171"
    },
    {
      "name": "CVE-2024-53173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53173"
    },
    {
      "name": "CVE-2024-53174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53174"
    },
    {
      "name": "CVE-2024-53179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
    },
    {
      "name": "CVE-2024-53206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
    },
    {
      "name": "CVE-2024-53208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
    },
    {
      "name": "CVE-2024-53209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53209"
    },
    {
      "name": "CVE-2024-53210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
    },
    {
      "name": "CVE-2024-53213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
    },
    {
      "name": "CVE-2024-53214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53214"
    },
    {
      "name": "CVE-2024-53215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
    },
    {
      "name": "CVE-2024-53217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
    },
    {
      "name": "CVE-2024-53224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
    },
    {
      "name": "CVE-2024-53229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
    },
    {
      "name": "CVE-2024-56539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56539"
    },
    {
      "name": "CVE-2024-56549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
    },
    {
      "name": "CVE-2024-56562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56562"
    },
    {
      "name": "CVE-2024-56567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56567"
    },
    {
      "name": "CVE-2024-56604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
    },
    {
      "name": "CVE-2024-56605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56605"
    },
    {
      "name": "CVE-2024-56645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56645"
    },
    {
      "name": "CVE-2024-56754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56754"
    },
    {
      "name": "CVE-2024-56755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56755"
    },
    {
      "name": "CVE-2024-56756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
    },
    {
      "name": "CVE-2022-48742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48742"
    },
    {
      "name": "CVE-2022-49033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49033"
    },
    {
      "name": "CVE-2022-49035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49035"
    },
    {
      "name": "CVE-2024-53239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53239"
    },
    {
      "name": "CVE-2024-56548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56548"
    },
    {
      "name": "CVE-2024-56570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56570"
    },
    {
      "name": "CVE-2024-56571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56571"
    },
    {
      "name": "CVE-2024-56575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56575"
    },
    {
      "name": "CVE-2024-56598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56598"
    },
    {
      "name": "CVE-2024-56619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56619"
    },
    {
      "name": "CVE-2024-56631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56631"
    },
    {
      "name": "CVE-2024-56704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56704"
    },
    {
      "name": "CVE-2024-50051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50051"
    },
    {
      "name": "CVE-2024-53227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53227"
    },
    {
      "name": "CVE-2024-53690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53690"
    },
    {
      "name": "CVE-2024-54680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54680"
    },
    {
      "name": "CVE-2024-55916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55916"
    },
    {
      "name": "CVE-2024-56531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56531"
    },
    {
      "name": "CVE-2024-56532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56532"
    },
    {
      "name": "CVE-2024-56533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56533"
    },
    {
      "name": "CVE-2024-56557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
    },
    {
      "name": "CVE-2024-56558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
    },
    {
      "name": "CVE-2024-56568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56568"
    },
    {
      "name": "CVE-2024-56588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
    },
    {
      "name": "CVE-2024-56595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56595"
    },
    {
      "name": "CVE-2024-56596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56596"
    },
    {
      "name": "CVE-2024-56597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56597"
    },
    {
      "name": "CVE-2024-56602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56602"
    },
    {
      "name": "CVE-2024-56623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56623"
    },
    {
      "name": "CVE-2024-56629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56629"
    },
    {
      "name": "CVE-2024-56642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56642"
    },
    {
      "name": "CVE-2024-56644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56644"
    },
    {
      "name": "CVE-2024-56648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56648"
    },
    {
      "name": "CVE-2024-56661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56661"
    },
    {
      "name": "CVE-2024-56664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
    },
    {
      "name": "CVE-2024-56678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56678"
    },
    {
      "name": "CVE-2024-56681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56681"
    },
    {
      "name": "CVE-2024-56688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56688"
    },
    {
      "name": "CVE-2024-56698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56698"
    },
    {
      "name": "CVE-2024-56701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56701"
    },
    {
      "name": "CVE-2024-56722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
    },
    {
      "name": "CVE-2024-56739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56739"
    },
    {
      "name": "CVE-2024-56745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
    },
    {
      "name": "CVE-2024-56747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56747"
    },
    {
      "name": "CVE-2024-56759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56759"
    },
    {
      "name": "CVE-2024-56765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
    },
    {
      "name": "CVE-2024-56776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56776"
    },
    {
      "name": "CVE-2024-56777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56777"
    },
    {
      "name": "CVE-2024-56778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56778"
    },
    {
      "name": "CVE-2024-57791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57791"
    },
    {
      "name": "CVE-2024-57792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57792"
    },
    {
      "name": "CVE-2024-57793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
    },
    {
      "name": "CVE-2024-57798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57798"
    },
    {
      "name": "CVE-2024-57849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57849"
    },
    {
      "name": "CVE-2024-57850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57850"
    },
    {
      "name": "CVE-2024-57876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
    },
    {
      "name": "CVE-2024-57893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
    },
    {
      "name": "CVE-2024-57896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57896"
    },
    {
      "name": "CVE-2024-57897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57897"
    },
    {
      "name": "CVE-2024-50304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50304"
    },
    {
      "name": "CVE-2024-56592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
    },
    {
      "name": "CVE-2024-56600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56600"
    },
    {
      "name": "CVE-2024-56601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56601"
    },
    {
      "name": "CVE-2024-56650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56650"
    },
    {
      "name": "CVE-2024-56658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56658"
    },
    {
      "name": "CVE-2024-57882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
    },
    {
      "name": "CVE-2025-21666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
    },
    {
      "name": "CVE-2025-21669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
    },
    {
      "name": "CVE-2025-21670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
    },
    {
      "name": "CVE-2025-21675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
    },
    {
      "name": "CVE-2024-57948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
    },
    {
      "name": "CVE-2025-21636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21636"
    },
    {
      "name": "CVE-2025-21637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21637"
    },
    {
      "name": "CVE-2025-21638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21638"
    },
    {
      "name": "CVE-2025-21639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21639"
    },
    {
      "name": "CVE-2025-21640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21640"
    },
    {
      "name": "CVE-2025-21647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
    },
    {
      "name": "CVE-2025-21665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
    },
    {
      "name": "CVE-2025-21667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
    },
    {
      "name": "CVE-2025-21668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
    },
    {
      "name": "CVE-2025-21680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
    },
    {
      "name": "CVE-2025-21681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
    },
    {
      "name": "CVE-2024-53177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
    },
    {
      "name": "CVE-2024-56633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56633"
    },
    {
      "name": "CVE-2025-21673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
    },
    {
      "name": "CVE-2024-50029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
    },
    {
      "name": "CVE-2024-50294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
    },
    {
      "name": "CVE-2024-53147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
    },
    {
      "name": "CVE-2024-53176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
    },
    {
      "name": "CVE-2024-53178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
    },
    {
      "name": "CVE-2024-53226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53226"
    },
    {
      "name": "CVE-2024-56720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56720"
    },
    {
      "name": "CVE-2023-52924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52924"
    },
    {
      "name": "CVE-2023-52925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52925"
    },
    {
      "name": "CVE-2024-56579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56579"
    },
    {
      "name": "CVE-2024-56647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
    },
    {
      "name": "CVE-2024-57889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57889"
    },
    {
      "name": "CVE-2025-21684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
    },
    {
      "name": "CVE-2025-21687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21687"
    },
    {
      "name": "CVE-2025-21688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21688"
    },
    {
      "name": "CVE-2025-21689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
    },
    {
      "name": "CVE-2025-21690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
    },
    {
      "name": "CVE-2025-21692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
    },
    {
      "name": "CVE-2025-21697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
    },
    {
      "name": "CVE-2025-21699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
    },
    {
      "name": "CVE-2025-21700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21700"
    },
    {
      "name": "CVE-2021-47633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47633"
    },
    {
      "name": "CVE-2021-47634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47634"
    },
    {
      "name": "CVE-2021-47644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47644"
    },
    {
      "name": "CVE-2022-49076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49076"
    },
    {
      "name": "CVE-2022-49080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
    },
    {
      "name": "CVE-2022-49089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
    },
    {
      "name": "CVE-2022-49124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
    },
    {
      "name": "CVE-2022-49134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
    },
    {
      "name": "CVE-2022-49135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49135"
    },
    {
      "name": "CVE-2022-49151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49151"
    },
    {
      "name": "CVE-2022-49178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
    },
    {
      "name": "CVE-2022-49182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49182"
    },
    {
      "name": "CVE-2022-49201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49201"
    },
    {
      "name": "CVE-2022-49247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49247"
    },
    {
      "name": "CVE-2022-49490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49490"
    },
    {
      "name": "CVE-2022-49626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49626"
    },
    {
      "name": "CVE-2022-49661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49661"
    },
    {
      "name": "CVE-2024-57979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
    },
    {
      "name": "CVE-2024-57994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
    },
    {
      "name": "CVE-2025-21705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
    },
    {
      "name": "CVE-2025-21715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
    },
    {
      "name": "CVE-2025-21716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
    },
    {
      "name": "CVE-2025-21719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
    },
    {
      "name": "CVE-2025-21724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
    },
    {
      "name": "CVE-2025-21725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2025-21754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
    },
    {
      "name": "CVE-2025-21802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
    }
  ],
  "initial_release_date": "2025-03-14T00:00:00",
  "last_revision_date": "2025-03-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0212",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0833-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250833-1"
    },
    {
      "published_at": "2025-03-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0847-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250847-1"
    },
    {
      "published_at": "2025-03-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0855-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250855-1"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0833-2",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250833-2"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0577-2",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250577-2"
    },
    {
      "published_at": "2025-03-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0856-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250856-1"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0834-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0835-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250835-1"
    },
    {
      "published_at": "2025-03-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0853-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250853-1"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:0201-2",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250201-2"
    }
  ]
}
  CERTFR-2022-AVI-669
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | 
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-29368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
    },
    {
      "name": "CVE-2021-4203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
    },
    {
      "name": "CVE-2022-32250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
    },
    {
      "name": "CVE-2022-1012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2022-1729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
    },
    {
      "name": "CVE-2021-4197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
    }
  ],
  "initial_release_date": "2022-07-22T00:00:00",
  "last_revision_date": "2022-07-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-669",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-07-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:5626 du 19 juillet 2022",
      "url": "https://access.redhat.com/errata/RHSA-2022:5626"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:5633 du 19 juillet 2022",
      "url": "https://access.redhat.com/errata/RHSA-2022:5633"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:5640 du 19 juillet 2022",
      "url": "https://access.redhat.com/errata/RHSA-2022:5640"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:5636 du 19 juillet 2022",
      "url": "https://access.redhat.com/errata/RHSA-2022:5636"
    }
  ]
}
  CERTFR-2024-AVI-0575
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.4 antérieures à 22.4R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 23.2 antérieures à 23.2R2-S1 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.2 antérieures à SSR-6.2.5-r2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.4-EVO antérieures à 22.4R3-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.2-EVO antérieures à 23.2R2-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.2 antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.3-EVO antérieures à 21.3R3-S5-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.2-EVO antérieures à 21.2R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 20.4R3-S9 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R2-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.1 antérieures à SSR-6.1.8-lts | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 antérieures à 20.4R3-S10 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 antérieures à 22.2R3-S1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 21.4 antérieures à 21.4R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R1-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 antérieures à 22.2R3-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 23.2R1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R1-S1-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.4R3-S8 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R1-S1 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions antérieures à 21.2R3-S7 | ||
| Juniper Networks | N/A | Session Smart Router versions antérieures à SSR-5.6.14 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 antérieures à 22.1R3-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 antérieures à 22.3R3-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.4R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R1-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R1-S1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos Space versions antérieures à 24.1R1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 20.4R3-S10-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.4 antérieures à 22.4R3-S1 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R1-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R2-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à before 22.1R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R2-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 antérieures à 22.1R3-S4 | ||
| Juniper Networks | N/A | Junos OS versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 22.1R2-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R1-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R2-S1 | ||
| Juniper Networks | N/A | Junos OS versions 23.1 antérieures à 23.1R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R2-S2 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R1-S2-EVO | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions 6.2 ant\u00e9rieures \u00e0 SSR-6.2.5-r2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.3-EVO ant\u00e9rieures \u00e0 21.3R3-S5-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.2-EVO ant\u00e9rieures \u00e0 21.2R3-S7-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R2-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions 6.1 ant\u00e9rieures \u00e0 SSR-6.1.8-lts",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 ant\u00e9rieures \u00e0 20.4R3-S10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 21.4 ant\u00e9rieures \u00e0 21.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 23.2R1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.2R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R1-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 21.4R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions ant\u00e9rieures \u00e0 21.2R3-S7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-5.6.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R1-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R1-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S10-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R1-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R2-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 before 22.1R3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 22.1R2-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R2-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.1 ant\u00e9rieures \u00e0 23.1R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R2-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-39560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39560"
    },
    {
      "name": "CVE-2023-32435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435"
    },
    {
      "name": "CVE-2021-44906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
    },
    {
      "name": "CVE-2024-20919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
    },
    {
      "name": "CVE-2024-39554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39554"
    },
    {
      "name": "CVE-2023-21843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
    },
    {
      "name": "CVE-2024-39539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39539"
    },
    {
      "name": "CVE-2021-36160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36160"
    },
    {
      "name": "CVE-2020-12401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
    },
    {
      "name": "CVE-2024-39558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39558"
    },
    {
      "name": "CVE-2022-30522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522"
    },
    {
      "name": "CVE-2021-37701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
    },
    {
      "name": "CVE-2022-21460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
    },
    {
      "name": "CVE-2021-31535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
    },
    {
      "name": "CVE-2022-36760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36760"
    },
    {
      "name": "CVE-2021-33034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
    },
    {
      "name": "CVE-2024-20926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
    },
    {
      "name": "CVE-2024-39552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39552"
    },
    {
      "name": "CVE-2021-27290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
    },
    {
      "name": "CVE-2019-11727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
    },
    {
      "name": "CVE-2023-3390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
    },
    {
      "name": "CVE-2023-4004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
    },
    {
      "name": "CVE-2021-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29469"
    },
    {
      "name": "CVE-2023-2002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
    },
    {
      "name": "CVE-2023-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2021-23440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23440"
    },
    {
      "name": "CVE-2021-32804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
    },
    {
      "name": "CVE-2020-13950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13950"
    },
    {
      "name": "CVE-2021-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
    },
    {
      "name": "CVE-2024-39546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39546"
    },
    {
      "name": "CVE-2024-39540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39540"
    },
    {
      "name": "CVE-2018-3737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3737"
    },
    {
      "name": "CVE-2024-39543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39543"
    },
    {
      "name": "CVE-2020-11984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11984"
    },
    {
      "name": "CVE-2022-22721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721"
    },
    {
      "name": "CVE-2021-35624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
    },
    {
      "name": "CVE-2023-35788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
    },
    {
      "name": "CVE-2023-32067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
    },
    {
      "name": "CVE-2024-39514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39514"
    },
    {
      "name": "CVE-2022-25147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
    },
    {
      "name": "CVE-2021-35604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
    },
    {
      "name": "CVE-2021-42013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42013"
    },
    {
      "name": "CVE-2023-34059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34059"
    },
    {
      "name": "CVE-2024-39529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39529"
    },
    {
      "name": "CVE-2006-20001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-20001"
    },
    {
      "name": "CVE-2024-20921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2022-29167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29167"
    },
    {
      "name": "CVE-2020-7774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
    },
    {
      "name": "CVE-2019-10747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10747"
    },
    {
      "name": "CVE-2023-34058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34058"
    },
    {
      "name": "CVE-2011-5094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-5094"
    },
    {
      "name": "CVE-2019-16776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
    },
    {
      "name": "CVE-2022-21589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2019-10097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10097"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2023-2828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
    },
    {
      "name": "CVE-2023-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
    },
    {
      "name": "CVE-2023-4206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
    },
    {
      "name": "CVE-2022-21304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
    },
    {
      "name": "CVE-2023-3090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
    },
    {
      "name": "CVE-2024-39536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39536"
    },
    {
      "name": "CVE-2024-39555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39555"
    },
    {
      "name": "CVE-2022-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
    },
    {
      "name": "CVE-2023-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
    },
    {
      "name": "CVE-2020-13938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13938"
    },
    {
      "name": "CVE-2016-10540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10540"
    },
    {
      "name": "CVE-2019-10082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10082"
    },
    {
      "name": "CVE-2023-42753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
    },
    {
      "name": "CVE-2016-1000232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000232"
    },
    {
      "name": "CVE-2015-9262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
    },
    {
      "name": "CVE-2023-32360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
    },
    {
      "name": "CVE-2021-37713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2024-39561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39561"
    },
    {
      "name": "CVE-2022-21303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
    },
    {
      "name": "CVE-2019-17023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
    },
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2020-35452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35452"
    },
    {
      "name": "CVE-2023-4207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
    },
    {
      "name": "CVE-2022-21617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
    },
    {
      "name": "CVE-2023-0767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
    },
    {
      "name": "CVE-2022-41741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41741"
    },
    {
      "name": "CVE-2023-22067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
    },
    {
      "name": "CVE-2021-37712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2023-30630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
    },
    {
      "name": "CVE-2022-21608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
    },
    {
      "name": "CVE-2022-2526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
    },
    {
      "name": "CVE-2023-20593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
    },
    {
      "name": "CVE-2024-39535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39535"
    },
    {
      "name": "CVE-2024-39545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39545"
    },
    {
      "name": "CVE-2024-39531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39531"
    },
    {
      "name": "CVE-2022-41742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41742"
    },
    {
      "name": "CVE-2019-16777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2023-21840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
    },
    {
      "name": "CVE-2019-10081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10081"
    },
    {
      "name": "CVE-2020-1934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1934"
    },
    {
      "name": "CVE-2022-30556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30556"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2022-21270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
    },
    {
      "name": "CVE-2023-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2023-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21980"
    },
    {
      "name": "CVE-2024-39530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39530"
    },
    {
      "name": "CVE-2024-39532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39532"
    },
    {
      "name": "CVE-2023-27522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27522"
    },
    {
      "name": "CVE-2024-39557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39557"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2024-39550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39550"
    },
    {
      "name": "CVE-2022-28615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615"
    },
    {
      "name": "CVE-2022-21451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
    },
    {
      "name": "CVE-2014-10064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-10064"
    },
    {
      "name": "CVE-2024-39511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39511"
    },
    {
      "name": "CVE-2022-23943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23943"
    },
    {
      "name": "CVE-2024-39548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39548"
    },
    {
      "name": "CVE-2020-11993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11993"
    },
    {
      "name": "CVE-2023-22652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22652"
    },
    {
      "name": "CVE-2024-39528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39528"
    },
    {
      "name": "CVE-2023-3341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
    },
    {
      "name": "CVE-2023-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
    },
    {
      "name": "CVE-2021-43527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
    },
    {
      "name": "CVE-2022-37434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
    },
    {
      "name": "CVE-2024-39559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39559"
    },
    {
      "name": "CVE-2014-7191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7191"
    },
    {
      "name": "CVE-2021-2356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
    },
    {
      "name": "CVE-2020-36049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36049"
    },
    {
      "name": "CVE-2023-4208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
    },
    {
      "name": "CVE-2021-41524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41524"
    },
    {
      "name": "CVE-2022-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
    },
    {
      "name": "CVE-2020-12402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
    },
    {
      "name": "CVE-2019-11719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2024-39519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39519"
    },
    {
      "name": "CVE-2021-32803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
    },
    {
      "name": "CVE-2019-17006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
    },
    {
      "name": "CVE-2022-21595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
    },
    {
      "name": "CVE-2019-16775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
    },
    {
      "name": "CVE-2020-12403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
    },
    {
      "name": "CVE-2023-3776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
    },
    {
      "name": "CVE-2023-2700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2700"
    },
    {
      "name": "CVE-2020-7754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7754"
    },
    {
      "name": "CVE-2024-39533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39533"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2021-26690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26690"
    },
    {
      "name": "CVE-2022-22719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22719"
    },
    {
      "name": "CVE-2022-40674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
    },
    {
      "name": "CVE-2022-46663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46663"
    },
    {
      "name": "CVE-2011-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1473"
    },
    {
      "name": "CVE-2024-39513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39513"
    },
    {
      "name": "CVE-2021-3803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
    },
    {
      "name": "CVE-2022-21417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
    },
    {
      "name": "CVE-2024-39518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39518"
    },
    {
      "name": "CVE-2023-37450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450"
    },
    {
      "name": "CVE-2021-30641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30641"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-7660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7660"
    },
    {
      "name": "CVE-2022-31813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813"
    },
    {
      "name": "CVE-2023-34969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
    },
    {
      "name": "CVE-2019-9517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517"
    },
    {
      "name": "CVE-2018-20834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20834"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2020-1927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1927"
    },
    {
      "name": "CVE-2022-21592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2023-25690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2022-22720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
    },
    {
      "name": "CVE-2017-15010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
    },
    {
      "name": "CVE-2019-10092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10092"
    },
    {
      "name": "CVE-2024-39541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39541"
    },
    {
      "name": "CVE-2021-44224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44224"
    },
    {
      "name": "CVE-2024-39537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39537"
    },
    {
      "name": "CVE-2022-21444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
    },
    {
      "name": "CVE-2019-17567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17567"
    },
    {
      "name": "CVE-2018-7408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7408"
    },
    {
      "name": "CVE-2019-20149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20149"
    },
    {
      "name": "CVE-2024-20932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
    },
    {
      "name": "CVE-2023-35001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
    },
    {
      "name": "CVE-2024-39551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39551"
    },
    {
      "name": "CVE-2023-4863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
    },
    {
      "name": "CVE-2022-29404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29404"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2019-11756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
    },
    {
      "name": "CVE-2024-20918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
    },
    {
      "name": "CVE-2024-39565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39565"
    },
    {
      "name": "CVE-2021-31618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31618"
    },
    {
      "name": "CVE-2022-21344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2024-39549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39549"
    },
    {
      "name": "CVE-2022-21367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
    },
    {
      "name": "CVE-2021-33193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33193"
    },
    {
      "name": "CVE-2021-41773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41773"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2022-26377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
    },
    {
      "name": "CVE-2021-44790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
    },
    {
      "name": "CVE-2020-9490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9490"
    },
    {
      "name": "CVE-2020-28502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28502"
    },
    {
      "name": "CVE-2024-39556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39556"
    },
    {
      "name": "CVE-2022-37436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37436"
    },
    {
      "name": "CVE-2021-33033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
    },
    {
      "name": "CVE-2023-32439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439"
    },
    {
      "name": "CVE-2020-12400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
    },
    {
      "name": "CVE-2023-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
    },
    {
      "name": "CVE-2022-28330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28330"
    },
    {
      "name": "CVE-2024-39542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39542"
    },
    {
      "name": "CVE-2022-21454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
    },
    {
      "name": "CVE-2017-1000048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000048"
    },
    {
      "name": "CVE-2022-21427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2024-20945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2020-6829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2022-21245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2024-20952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
    },
    {
      "name": "CVE-2019-10098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10098"
    },
    {
      "name": "CVE-2024-39538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39538"
    },
    {
      "name": "CVE-2022-28614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614"
    }
  ],
  "initial_release_date": "2024-07-12T00:00:00",
  "last_revision_date": "2024-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0575",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-12T00:00:00.000000"
    },
    {
      "description": "Correction d\u0027identifiants CVE erron\u00e9s",
      "revision_date": "2024-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
  "vendor_advisories": [
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83001",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Inconsistent-information-in-the-TE-database-can-lead-to-an-rpd-crash-CVE-2024-39541"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82976",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-The-802-1X-Authentication-Daemon-crashes-on-running-a-specific-command-CVE-2024-39511"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83027",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83021",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX4600-SRX5000-Series-TCP-packets-with-SYN-FIN-or-SYN-RST-are-transferred-after-enabling-no-syn-check-with-Express-Path-CVE-2024-39561"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83018",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specific-PIM-packet-causes-rpd-crash-when-PIM-is-configured-along-with-MoFRR-CVE-2024-39558"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82987",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crashes-upon-concurrent-deletion-of-a-routing-instance-and-receipt-of-an-SNMP-request-CVE-2024-39528"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82982",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX240-MX480-MX960-platforms-using-MPC10E-Memory-leak-will-be-observed-when-subscribed-to-a-specific-subscription-on-Junos-Telemetry-Interface-CVE-2024-39518"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83012",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-line-card-Port-flaps-causes-rtlogd-memory-leak-leading-to-Denial-of-Service-CVE-2024-39550"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83019",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-a-specific-TCP-packet-may-result-in-a-system-crash-vmcore-on-dual-RE-systems-with-NSR-enabled-CVE-2024-39559"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83004",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-large-RPKI-RTR-PDU-packet-can-cause-rpd-to-crash-CVE-2024-39543"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83010",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-specific-packets-in-the-aftmand-process-will-lead-to-a-memory-leak-CVE-2024-39548"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83014",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-BGP-multipath-incremental-calculation-is-resulting-in-an-rpd-crash-CVE-2024-39554"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82996",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Flaps-of-BFD-sessions-with-authentication-cause-a-ppmd-memory-leak-CVE-2024-39536"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82980",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receiving-specific-traffic-on-devices-with-EVPN-VPWS-with-IGMP-snooping-enabled-will-cause-the-rpd-to-crash-CVE-2024-39514"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83000",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-Specific-valid-TCP-traffic-can-cause-a-pfe-crash-CVE-2024-39540"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83008",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Local-low-privilege-user-can-gain-root-permissions-leading-to-privilege-escalation-CVE-2024-39546"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82991",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Protocol-specific-DDoS-configuration-affects-other-protocols-CVE-2024-39531"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83011",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Receipt-of-malformed-BGP-path-attributes-leads-to-a-memory-leak-CVE-2024-39549"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82989",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Attempting-to-access-specific-sensors-on-platforms-not-supporting-these-will-lead-to-a-chassisd-crash-CVE-2024-39530"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82997",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Ports-which-have-been-inadvertently-exposed-can-be-reached-over-the-network-CVE-2024-39537"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83023",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-EX-Series-J-Web-An-unauthenticated-network-based-attacker-can-perform-XPATH-injection-attack-against-a-device-CVE-2024-39565"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83026",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R1-release"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83013",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-MS-MPC-MIC-Receipt-of-specific-packets-in-H-323-ALG-causes-traffic-drop-CVE-2024-39551"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83002",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-CFM-packet-or-specific-transit-traffic-leads-to-FPC-crash-CVE-2024-39542"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83015",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-malformed-BGP-update-causes-the-session-to-reset-CVE-2024-39555"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83007",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-NFX350-When-VPN-tunnels-parameters-are-not-matching-the-iked-process-will-crash-CVE-2024-39545"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82995",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-specific-traffic-is-received-in-a-VPLS-scenario-evo-pfemand-crashes-CVE-2024-39535"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82993",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4600-Series-Output-firewall-filter-is-not-applied-if-certain-match-criteria-are-used-CVE-2024-39533"
    },
    {
      "published_at": "2024-07-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75726",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Malformed-BGP-UPDATE-causes-RPD-crash-CVE-2024-39552"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82988",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-If-DNS-traceoptions-are-configured-in-a-DGA-or-tunnel-detection-scenario-specific-DNS-traffic-leads-to-a-PFE-crash-CVE-2024-39529"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83017",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-MAC-table-changes-cause-a-memory-leak-CVE-2024-39557"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82983",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX-7000-Series-Multicast-traffic-is-looped-in-a-multihoming-EVPN-MPLS-scenario-CVE-2024-39519"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83020",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Memory-leak-due-to-RSVP-neighbor-persistent-error-leading-to-kernel-crash-CVE-2024-39560"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82998",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-multicast-traffic-with-a-specific-S-G-is-received-evo-pfemand-crashes-CVE-2024-39538"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82999",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-Continuous-subscriber-logins-will-lead-to-a-memory-leak-and-eventually-an-FPC-crash-CVE-2024-39539"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83016",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Loading-a-malicious-certificate-from-the-CLI-may-result-in-a-stack-based-overflow-CVE-2024-39556"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82992",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Confidential-information-in-logs-can-be-accessed-by-another-user-CVE-2024-39532"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82978",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Execution-of-a-specific-CLI-command-will-cause-a-crash-in-the-AFT-manager-CVE-2024-39513"
    }
  ]
}
  CERTFR-2021-AVI-742
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 16.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 21.04",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 20.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 14.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-38205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38205"
    },
    {
      "name": "CVE-2021-34556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
    },
    {
      "name": "CVE-2021-3679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
    },
    {
      "name": "CVE-2021-38204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
    },
    {
      "name": "CVE-2021-38166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38166"
    },
    {
      "name": "CVE-2021-38160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
    },
    {
      "name": "CVE-2021-38199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38199"
    },
    {
      "name": "CVE-2021-41073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41073"
    },
    {
      "name": "CVE-2021-38203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38203"
    },
    {
      "name": "CVE-2021-37159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
    },
    {
      "name": "CVE-2021-40490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-38202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38202"
    },
    {
      "name": "CVE-2021-33624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
    },
    {
      "name": "CVE-2021-3732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
    },
    {
      "name": "CVE-2021-38201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38201"
    },
    {
      "name": "CVE-2021-35477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
    }
  ],
  "initial_release_date": "2021-09-30T00:00:00",
  "last_revision_date": "2021-09-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-742",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5092-1 du 28 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5092-1"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5092-2 du 29 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5092-2"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5091-1 du 28 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5091-1"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5094-1 du 29 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5094-1"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5096-1 du 29 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5096-1"
    }
  ]
}
  CERTFR-2021-AVI-791
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 | 
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
      "product": {
        "name": "Cognos Analytics",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
      "product": {
        "name": "Cognos Analytics",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-25013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
    },
    {
      "name": "CVE-2020-8315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
    },
    {
      "name": "CVE-2021-25215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
    },
    {
      "name": "CVE-2020-24977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
    },
    {
      "name": "CVE-2020-13543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
    },
    {
      "name": "CVE-2021-23364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
    },
    {
      "name": "CVE-2020-13434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
    },
    {
      "name": "CVE-2021-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
    },
    {
      "name": "CVE-2021-23336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
    },
    {
      "name": "CVE-2021-2163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
    },
    {
      "name": "CVE-2021-3537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
    },
    {
      "name": "CVE-2021-27290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
    },
    {
      "name": "CVE-2020-8285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
    },
    {
      "name": "CVE-2021-20271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
    },
    {
      "name": "CVE-2021-2341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
    },
    {
      "name": "CVE-2017-12620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
    },
    {
      "name": "CVE-2021-27219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
    },
    {
      "name": "CVE-2020-8622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
    },
    {
      "name": "CVE-2020-29362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
    },
    {
      "name": "CVE-2020-9983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
    },
    {
      "name": "CVE-2021-1820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
    },
    {
      "name": "CVE-2018-25011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
    },
    {
      "name": "CVE-2020-26116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
    },
    {
      "name": "CVE-2020-8286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
    },
    {
      "name": "CVE-2020-9951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
    },
    {
      "name": "CVE-2021-3421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
    },
    {
      "name": "CVE-2021-20305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
    },
    {
      "name": "CVE-2021-22918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
    },
    {
      "name": "CVE-2021-20578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
    },
    {
      "name": "CVE-2020-8177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2021-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
    },
    {
      "name": "CVE-2021-3450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
    },
    {
      "name": "CVE-2020-14363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
    },
    {
      "name": "CVE-2019-2708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
    },
    {
      "name": "CVE-2020-10878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
    },
    {
      "name": "CVE-2019-13012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
    },
    {
      "name": "CVE-2021-29679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
    },
    {
      "name": "CVE-2020-25648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
    },
    {
      "name": "CVE-2021-2432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
    },
    {
      "name": "CVE-2020-8624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
    },
    {
      "name": "CVE-2021-33910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
    },
    {
      "name": "CVE-2020-8284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
    },
    {
      "name": "CVE-2020-14362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
    },
    {
      "name": "CVE-2021-3516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
    },
    {
      "name": "CVE-2019-3842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
    },
    {
      "name": "CVE-2021-3449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
    },
    {
      "name": "CVE-2021-1826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
    },
    {
      "name": "CVE-2020-8617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
    },
    {
      "name": "CVE-2017-14502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
    },
    {
      "name": "CVE-2020-29361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
    },
    {
      "name": "CVE-2021-1817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
    },
    {
      "name": "CVE-2021-3520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
    },
    {
      "name": "CVE-2020-10029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
    },
    {
      "name": "CVE-2021-2369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
    },
    {
      "name": "CVE-2020-14347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
    },
    {
      "name": "CVE-2020-14360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
    },
    {
      "name": "CVE-2021-1825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
    },
    {
      "name": "CVE-2020-13776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
    },
    {
      "name": "CVE-2020-14346",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
    },
    {
      "name": "CVE-2020-14361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
    },
    {
      "name": "CVE-2020-10543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
    },
    {
      "name": "CVE-2021-30661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
    },
    {
      "name": "CVE-2020-8927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
    },
    {
      "name": "CVE-2020-15358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
    },
    {
      "name": "CVE-2021-2388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
    },
    {
      "name": "CVE-2020-29363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
    },
    {
      "name": "CVE-2021-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2020-13584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
    },
    {
      "name": "CVE-2020-36328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
    },
    {
      "name": "CVE-2020-27619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
    },
    {
      "name": "CVE-2020-8492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
    },
    {
      "name": "CVE-2019-9169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
    },
    {
      "name": "CVE-2020-29573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
    },
    {
      "name": "CVE-2020-4951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-8231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
    },
    {
      "name": "CVE-2016-10228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
    },
    {
      "name": "CVE-2020-28196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2020-26137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
    },
    {
      "name": "CVE-2021-25214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
    },
    {
      "name": "CVE-2021-27218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
    },
    {
      "name": "CVE-2020-13933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
    },
    {
      "name": "CVE-2020-14344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
    },
    {
      "name": "CVE-2021-3541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
    },
    {
      "name": "CVE-2019-18276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
    },
    {
      "name": "CVE-2021-3326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
    },
    {
      "name": "CVE-2020-24332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
    },
    {
      "name": "CVE-2020-25712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
    },
    {
      "name": "CVE-2021-29745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
    },
    {
      "name": "CVE-2020-24330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
    },
    {
      "name": "CVE-2020-36329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
    },
    {
      "name": "CVE-2021-29894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
    },
    {
      "name": "CVE-2020-9948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
    },
    {
      "name": "CVE-2020-27618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
    },
    {
      "name": "CVE-2021-23362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
    },
    {
      "name": "CVE-2020-27783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
    },
    {
      "name": "CVE-2020-12049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2021-3518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
    },
    {
      "name": "CVE-2020-24331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
    },
    {
      "name": "CVE-2020-14345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
    },
    {
      "name": "CVE-2020-25692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
    },
    {
      "name": "CVE-2020-8625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
    }
  ],
  "initial_release_date": "2021-10-15T00:00:00",
  "last_revision_date": "2021-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-791",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
      "url": "https://www.ibm.com/support/pages/node/6491661"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
      "url": "https://www.ibm.com/support/pages/node/6493729"
    }
  ]
}
  CERTFR-2021-AVI-680
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 | 
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
    },
    {
      "name": "CVE-2021-0512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-38201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38201"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    }
  ],
  "initial_release_date": "2021-09-08T00:00:00",
  "last_revision_date": "2021-09-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-680",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3446 du 07 septembre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3446"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3445 du 07 septembre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3445"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3444 du 07 septembre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3444"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3447 du 07 septembre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3447"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3440 du 07 septembre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3440"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3363 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3363"
    }
  ]
}
  CERTFR-2021-AVI-748
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 18.04 LTS pour Raspberry Pi",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 20.04 LTS pour Raspberry Pi",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-38205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38205"
    },
    {
      "name": "CVE-2021-3679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
    },
    {
      "name": "CVE-2021-38204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
    },
    {
      "name": "CVE-2021-38160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
    },
    {
      "name": "CVE-2021-38199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38199"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-33624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
    },
    {
      "name": "CVE-2021-3732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
    }
  ],
  "initial_release_date": "2021-10-04T00:00:00",
  "last_revision_date": "2021-10-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-748",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-10-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5094-2 du 30 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5094-2"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5091-2 du 30 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5091-2"
    }
  ]
}
  CERTFR-2021-AVI-916
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 | 
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Debuginfo 11-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 11-SP4-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE CaaS Platform 4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP 15-SP1",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15-SP1-BCL",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Enterprise Storage 6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 11-EXTRA",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-20322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
    },
    {
      "name": "CVE-2021-3655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
    },
    {
      "name": "CVE-2020-12770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
    },
    {
      "name": "CVE-2021-34556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
    },
    {
      "name": "CVE-2021-3679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
    },
    {
      "name": "CVE-2020-3702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
    },
    {
      "name": "CVE-2020-4788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-4788"
    },
    {
      "name": "CVE-2019-3874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
    },
    {
      "name": "CVE-2021-41864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
    },
    {
      "name": "CVE-2021-38204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
    },
    {
      "name": "CVE-2020-36385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
    },
    {
      "name": "CVE-2014-7841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7841"
    },
    {
      "name": "CVE-2021-3542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3542"
    },
    {
      "name": "CVE-2021-31916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
    },
    {
      "name": "CVE-2021-38160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
    },
    {
      "name": "CVE-2021-3760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
    },
    {
      "name": "CVE-2021-3772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
    },
    {
      "name": "CVE-2021-3753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
    },
    {
      "name": "CVE-2021-3659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
    },
    {
      "name": "CVE-2021-34981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
    },
    {
      "name": "CVE-2021-3759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
    },
    {
      "name": "CVE-2018-13405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
    },
    {
      "name": "CVE-2021-37159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
    },
    {
      "name": "CVE-2021-40490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
    },
    {
      "name": "CVE-2021-0941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
    },
    {
      "name": "CVE-2021-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
    },
    {
      "name": "CVE-2021-38198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2021-42739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2019-3900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
    },
    {
      "name": "CVE-2021-20265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
    },
    {
      "name": "CVE-2021-3764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
    },
    {
      "name": "CVE-2021-42008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
    },
    {
      "name": "CVE-2021-42252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
    },
    {
      "name": "CVE-2021-35477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
    },
    {
      "name": "CVE-2021-3744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
    },
    {
      "name": "CVE-2021-33033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
    },
    {
      "name": "CVE-2018-9517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
    },
    {
      "name": "CVE-2020-0429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0429"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    },
    {
      "name": "CVE-2021-43389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
    }
  ],
  "initial_release_date": "2021-12-03T00:00:00",
  "last_revision_date": "2021-12-03T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-916",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-12-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-202114849-1 du 01 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114849-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213877-1 du 01 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213877-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213876-1 du 01 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213876-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213848-1 du 01 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213848-1/"
    }
  ]
}
  CERTFR-2021-AVI-923
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE MicroOS 5.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 | 
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE MicroOS 5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP3-BCL",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE MicroOS 5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP 12-SP3",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "HPE Helion Openstack 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP2-BCL",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud Crowbar 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP 15",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 12-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-20322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
    },
    {
      "name": "CVE-2021-3655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
    },
    {
      "name": "CVE-2017-17864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
    },
    {
      "name": "CVE-2020-12770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
    },
    {
      "name": "CVE-2021-34556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
    },
    {
      "name": "CVE-2021-3896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3896"
    },
    {
      "name": "CVE-2018-16882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-16882"
    },
    {
      "name": "CVE-2021-3679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
    },
    {
      "name": "CVE-2020-3702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
    },
    {
      "name": "CVE-2020-4788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-4788"
    },
    {
      "name": "CVE-2019-3874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
    },
    {
      "name": "CVE-2021-41864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
    },
    {
      "name": "CVE-2021-38204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
    },
    {
      "name": "CVE-2021-3542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3542"
    },
    {
      "name": "CVE-2021-31916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
    },
    {
      "name": "CVE-2021-38160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
    },
    {
      "name": "CVE-2021-3760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
    },
    {
      "name": "CVE-2020-12655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
    },
    {
      "name": "CVE-2021-3772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
    },
    {
      "name": "CVE-2021-3753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
    },
    {
      "name": "CVE-2017-17862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
    },
    {
      "name": "CVE-2021-3659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
    },
    {
      "name": "CVE-2021-34981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
    },
    {
      "name": "CVE-2018-13405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
    },
    {
      "name": "CVE-2018-3639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
    },
    {
      "name": "CVE-2021-37159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
    },
    {
      "name": "CVE-2021-40490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2017-5753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
    },
    {
      "name": "CVE-2021-0941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
    },
    {
      "name": "CVE-2021-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
    },
    {
      "name": "CVE-2021-38198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2020-14305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
    },
    {
      "name": "CVE-2021-42739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2019-3900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
    },
    {
      "name": "CVE-2021-20265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
    },
    {
      "name": "CVE-2021-20320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20320"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
    },
    {
      "name": "CVE-2021-3764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
    },
    {
      "name": "CVE-2021-42008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
    },
    {
      "name": "CVE-2021-42252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
    },
    {
      "name": "CVE-2021-35477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
    },
    {
      "name": "CVE-2021-3744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
    },
    {
      "name": "CVE-2021-33033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
    },
    {
      "name": "CVE-2018-9517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
    },
    {
      "name": "CVE-2020-0429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0429"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    },
    {
      "name": "CVE-2021-43389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
    }
  ],
  "initial_release_date": "2021-12-08T00:00:00",
  "last_revision_date": "2021-12-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-923",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-12-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213933-1 du 06 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213933-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213929-1 du 06 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213929-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213941-1 du 07 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213941-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213969-1 du 08 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213969-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213935-1 du 07 d\u00e9cembre 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213935-1/"
    }
  ]
}
  CERTFR-2021-AVI-786
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | 
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Workstation 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Desktop 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    }
  ],
  "initial_release_date": "2021-10-14T00:00:00",
  "last_revision_date": "2021-10-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-786",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-10-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3812 du 12 octobre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3812"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3766 du 12 octobre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3766"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3801 du 12 octobre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3801"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3802 du 12 octobre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3802"
    }
  ]
}
  CERTFR-2021-AVI-726
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 20.04 LTS pour Raspberry PI V8",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 LTS pour Raspberry PI V8",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-34693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
    },
    {
      "name": "CVE-2021-38160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
    }
  ],
  "initial_release_date": "2021-09-22T00:00:00",
  "last_revision_date": "2021-09-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-726",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Linux USN-5071-3 du 22 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5071-3"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Linux USN-5073-3 du 22 septembre 2021",
      "url": "https://ubuntu.com/security/notices/USN-5073-3"
    }
  ]
}
  CERTFR-2023-AVI-0051
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2016-8625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
    },
    {
      "name": "CVE-2016-8743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
    },
    {
      "name": "CVE-2017-12613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
    },
    {
      "name": "CVE-2019-1543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
    },
    {
      "name": "CVE-2019-1551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
    },
    {
      "name": "CVE-2020-0549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
    },
    {
      "name": "CVE-2020-0548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2020-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
    },
    {
      "name": "CVE-2020-14579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
    },
    {
      "name": "CVE-2020-14573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
    },
    {
      "name": "CVE-2020-14577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
    },
    {
      "name": "CVE-2020-14578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
    },
    {
      "name": "CVE-2020-14621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
    },
    {
      "name": "CVE-2020-14562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
    },
    {
      "name": "CVE-2020-14583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
    },
    {
      "name": "CVE-2020-14581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
    },
    {
      "name": "CVE-2020-14593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
    },
    {
      "name": "CVE-2020-14556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2020-14796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
    },
    {
      "name": "CVE-2020-14803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
    },
    {
      "name": "CVE-2020-14792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
    },
    {
      "name": "CVE-2020-14779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
    },
    {
      "name": "CVE-2020-14798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
    },
    {
      "name": "CVE-2020-14797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
    },
    {
      "name": "CVE-2020-14781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
    },
    {
      "name": "CVE-2020-14782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
    },
    {
      "name": "CVE-2020-14871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
    },
    {
      "name": "CVE-2020-8698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
    },
    {
      "name": "CVE-2020-8696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
    },
    {
      "name": "CVE-2020-25704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
    },
    {
      "name": "CVE-2020-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
    },
    {
      "name": "CVE-2020-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2020-8695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
    },
    {
      "name": "CVE-2019-20934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
    },
    {
      "name": "CVE-2021-3156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2021-23841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
    },
    {
      "name": "CVE-2021-23840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-12363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2020-12364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
    },
    {
      "name": "CVE-2021-27365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
    },
    {
      "name": "CVE-2021-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
    },
    {
      "name": "CVE-2021-27364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
    },
    {
      "name": "CVE-2020-27170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
    },
    {
      "name": "CVE-2021-3450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
    },
    {
      "name": "CVE-2020-35498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
    },
    {
      "name": "CVE-2021-28950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
    },
    {
      "name": "CVE-2021-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
    },
    {
      "name": "CVE-2020-36322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
    },
    {
      "name": "CVE-2021-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
    },
    {
      "name": "CVE-2021-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
    },
    {
      "name": "CVE-2021-2179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
    },
    {
      "name": "CVE-2021-2307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
    },
    {
      "name": "CVE-2021-2180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
    },
    {
      "name": "CVE-2021-2144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
    },
    {
      "name": "CVE-2021-2226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
    },
    {
      "name": "CVE-2021-2169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
    },
    {
      "name": "CVE-2021-2202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
    },
    {
      "name": "CVE-2021-2166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
    },
    {
      "name": "CVE-2021-2174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
    },
    {
      "name": "CVE-2021-2154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
    },
    {
      "name": "CVE-2020-28196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
    },
    {
      "name": "CVE-2021-2178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
    },
    {
      "name": "CVE-2021-2146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
    },
    {
      "name": "CVE-2021-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
    },
    {
      "name": "CVE-2021-2171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
    },
    {
      "name": "CVE-2021-2161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
    },
    {
      "name": "CVE-2021-2163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
    },
    {
      "name": "CVE-2021-29650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
    },
    {
      "name": "CVE-2021-23017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
    },
    {
      "name": "CVE-2021-25217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
    },
    {
      "name": "CVE-2021-33033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
    },
    {
      "name": "CVE-2020-24512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
    },
    {
      "name": "CVE-2020-24513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
    },
    {
      "name": "CVE-2020-24511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    },
    {
      "name": "CVE-2021-33034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
    },
    {
      "name": "CVE-2021-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
    },
    {
      "name": "CVE-2021-3573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
    },
    {
      "name": "CVE-2020-36385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
    },
    {
      "name": "CVE-2020-27827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2021-2388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
    },
    {
      "name": "CVE-2021-2341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
    },
    {
      "name": "CVE-2021-2432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
    },
    {
      "name": "CVE-2021-2369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2021-27219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
    },
    {
      "name": "CVE-2020-26137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2020-26116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
    },
    {
      "name": "CVE-2021-35603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
    },
    {
      "name": "CVE-2021-35586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
    },
    {
      "name": "CVE-2021-35559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
    },
    {
      "name": "CVE-2021-35567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
    },
    {
      "name": "CVE-2021-35578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
    },
    {
      "name": "CVE-2021-35550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
    },
    {
      "name": "CVE-2021-35561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
    },
    {
      "name": "CVE-2021-35565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
    },
    {
      "name": "CVE-2021-35564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
    },
    {
      "name": "CVE-2021-35556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
    },
    {
      "name": "CVE-2021-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
    },
    {
      "name": "CVE-2021-0920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
    },
    {
      "name": "CVE-2021-42739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
    },
    {
      "name": "CVE-2021-44790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
    },
    {
      "name": "CVE-2021-4083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
    },
    {
      "name": "CVE-2021-4155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
    },
    {
      "name": "CVE-2022-21349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
    },
    {
      "name": "CVE-2022-21277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
    },
    {
      "name": "CVE-2022-21291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
    },
    {
      "name": "CVE-2022-21340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
    },
    {
      "name": "CVE-2022-21282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
    },
    {
      "name": "CVE-2022-21341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
    },
    {
      "name": "CVE-2022-21365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
    },
    {
      "name": "CVE-2022-21305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
    },
    {
      "name": "CVE-2022-21366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
    },
    {
      "name": "CVE-2022-21360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
    },
    {
      "name": "CVE-2022-21296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
    },
    {
      "name": "CVE-2022-21293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
    },
    {
      "name": "CVE-2022-21248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
    },
    {
      "name": "CVE-2022-21299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
    },
    {
      "name": "CVE-2022-21294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
    },
    {
      "name": "CVE-2022-21283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2021-4028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
    },
    {
      "name": "CVE-2022-2526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
    },
    {
      "name": "CVE-2022-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
    },
    {
      "name": "CVE-2022-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
    },
    {
      "name": "CVE-2022-21449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
    },
    {
      "name": "CVE-2022-21476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
    },
    {
      "name": "CVE-2022-21125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
    },
    {
      "name": "CVE-2022-21123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
    },
    {
      "name": "CVE-2022-21166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
    },
    {
      "name": "CVE-2022-38178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-32250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2022-0330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2022-0492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2022-22720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2022-21434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
    },
    {
      "name": "CVE-2022-21443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
    },
    {
      "name": "CVE-2022-21496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
    },
    {
      "name": "CVE-2022-21426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2022-1729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
    },
    {
      "name": "CVE-2021-30465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
    },
    {
      "name": "CVE-2021-42574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
    },
    {
      "name": "CVE-2022-21541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
    },
    {
      "name": "CVE-2022-34169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
    },
    {
      "name": "CVE-2022-21549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
    },
    {
      "name": "CVE-2022-21540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
    },
    {
      "name": "CVE-2007-6755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2021-3765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
    },
    {
      "name": "CVE-2022-24903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
    },
    {
      "name": "CVE-2022-21626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
    },
    {
      "name": "CVE-2022-21619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
    },
    {
      "name": "CVE-2022-21628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
    },
    {
      "name": "CVE-2022-21624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
    },
    {
      "name": "CVE-2019-11287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
    },
    {
      "name": "CVE-2023-22397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
    },
    {
      "name": "CVE-2023-22403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
    },
    {
      "name": "CVE-2023-22398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
    },
    {
      "name": "CVE-2023-22399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
    },
    {
      "name": "CVE-2023-22417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
    },
    {
      "name": "CVE-2023-22395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
    },
    {
      "name": "CVE-2023-22391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
    },
    {
      "name": "CVE-2023-22409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
    },
    {
      "name": "CVE-2023-22407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
    },
    {
      "name": "CVE-2023-22414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
    },
    {
      "name": "CVE-2023-22393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
    },
    {
      "name": "CVE-2023-22415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
    },
    {
      "name": "CVE-2023-22405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
    },
    {
      "name": "CVE-2023-22412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
    },
    {
      "name": "CVE-2020-24489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
    },
    {
      "name": "CVE-2023-22404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
    },
    {
      "name": "CVE-2021-3504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
    },
    {
      "name": "CVE-2023-22394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
    },
    {
      "name": "CVE-2023-22406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
    },
    {
      "name": "CVE-2018-8046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
    },
    {
      "name": "CVE-2007-2285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
    },
    {
      "name": "CVE-2021-35940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
    },
    {
      "name": "CVE-2023-22411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
    },
    {
      "name": "CVE-2023-22401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
    },
    {
      "name": "CVE-2020-15778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
    },
    {
      "name": "CVE-2023-22396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
    },
    {
      "name": "CVE-2023-22402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
    },
    {
      "name": "CVE-2021-3621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
    },
    {
      "name": "CVE-2023-22400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
    },
    {
      "name": "CVE-2023-22408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
    },
    {
      "name": "CVE-2022-0934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
    },
    {
      "name": "CVE-2021-40085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
    },
    {
      "name": "CVE-2023-22410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
    },
    {
      "name": "CVE-2023-22416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
    },
    {
      "name": "CVE-2023-22413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
    }
  ],
  "initial_release_date": "2023-01-23T00:00:00",
  "last_revision_date": "2023-01-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0051",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-01-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
    }
  ]
}
  CERTFR-2021-AVI-752
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    }
  ],
  "initial_release_date": "2021-10-06T00:00:00",
  "last_revision_date": "2021-10-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-752",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-10-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3725 du 05 octobre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3725"
    }
  ]
}
  CERTFR-2021-AVI-665
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | 
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Workstation 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Desktop 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-27777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
    },
    {
      "name": "CVE-2021-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2021-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-29650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    }
  ],
  "initial_release_date": "2021-09-01T00:00:00",
  "last_revision_date": "2021-09-01T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-665",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3321 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3321"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3327 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3327"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3375 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3328"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3320 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3320"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3399 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3399"
    }
  ]
}
  CERTFR-2021-AVI-629
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise High Availability 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-35039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
    },
    {
      "name": "CVE-2021-3659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
    },
    {
      "name": "CVE-2021-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
    },
    {
      "name": "CVE-2021-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21781"
    }
  ],
  "initial_release_date": "2021-08-16T00:00:00",
  "last_revision_date": "2021-08-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-629",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-08-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2021:2687-1 du 14 ao\u00fbt 2021",
      "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212687-1/"
    }
  ]
}
  CERTFR-2022-AVI-401
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | IBM Spectrum Protect Plus Container Backup and Restore pour Kubernetes versions 10.1.5.x à 10.1.10.x antérieures à 10.1.10.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4.3 antérieures à 7.4.3 FP5 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus Container Backup and Restore pour Red Hat OpenShift versions 10.1.7.x à 10.1.10.x antérieures à 10.1.10.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.0 antérieures à 7.5.0 UP1 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3.3 antérieures à 7.3.3 FP11 | 
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM Spectrum Protect Plus Container Backup and Restore pour Kubernetes versions 10.1.5.x \u00e0 10.1.10.x ant\u00e9rieures \u00e0 10.1.10.2",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM QRadar SIEM versions 7.4.3 ant\u00e9rieures \u00e0 7.4.3 FP5",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect Plus Container Backup and Restore pour Red Hat OpenShift versions 10.1.7.x \u00e0 10.1.10.x ant\u00e9rieures \u00e0 10.1.10.2",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM QRadar SIEM versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP1",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM QRadar SIEM versions 7.3.3 ant\u00e9rieures \u00e0 7.3.3 FP11",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-24921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    }
  ],
  "initial_release_date": "2022-04-29T00:00:00",
  "last_revision_date": "2022-04-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-401",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-04-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6576215 du 28 avril 2022",
      "url": "https://www.ibm.com/support/pages/node/6576215"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6576217 du 28 avril 2022",
      "url": "https://www.ibm.com/support/pages/node/6576217"
    }
  ]
}
  rhsa-2021:4000
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:4000",
        "url": "https://access.redhat.com/errata/RHSA-2021:4000"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4000.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:10+00:00",
      "generator": {
        "date": "2025-10-09T20:59:10+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:4000",
      "initial_release_date": "2021-10-26T16:28:07+00:00",
      "revision_history": [
        {
          "date": "2021-10-26T16:28:07+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-26T16:28:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:10+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-2.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T16:28:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4000"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T16:28:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4000"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  RHSA-2022:5640
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:5640",
        "url": "https://access.redhat.com/errata/RHSA-2022:5640"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5640.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:20+00:00",
      "generator": {
        "date": "2025-10-09T20:59:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:5640",
      "initial_release_date": "2022-07-19T16:27:59+00:00",
      "revision_history": [
        {
          "date": "2022-07-19T16:27:59+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-07-19T16:27:59+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                  "product_id": "6Server-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
                  "product_id": "6Server-optional-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.src",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.src",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "perf-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "perf-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "python-perf-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "python-perf-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "python-perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "python-perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
                  "product_id": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.48.1.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
                  "product_id": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.48.1.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
                "product": {
                  "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
                  "product_id": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.48.1.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.src",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.src",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
          "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
          "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
          "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
          "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
          "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
          "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        ],
        "known_not_affected": [
          "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-07-19T16:27:59+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5640"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  RHSA-2021:3375
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3375",
        "url": "https://access.redhat.com/errata/RHSA-2021:3375"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:09+00:00",
      "generator": {
        "date": "2025-10-10T19:53:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3375",
      "initial_release_date": "2021-08-31T08:56:13+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T08:56:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T08:56:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
                  "product_id": "RT-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
                  "product_id": "NFV-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
                  "product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2021:3814
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3814",
        "url": "https://access.redhat.com/errata/RHSA-2021:3814"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3814.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:14+00:00",
      "generator": {
        "date": "2025-10-10T19:53:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3814",
      "initial_release_date": "2021-10-12T15:14:01+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T15:14:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T15:14:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3814"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3814"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3814"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  RHSA-2021:3380
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3380",
        "url": "https://access.redhat.com/errata/RHSA-2021:3380"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:11+00:00",
      "generator": {
        "date": "2025-10-10T19:53:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3380",
      "initial_release_date": "2021-08-31T09:18:03+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T09:18:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T09:18:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                  "product_id": "BaseOS-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021:3375
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3375",
        "url": "https://access.redhat.com/errata/RHSA-2021:3375"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:09+00:00",
      "generator": {
        "date": "2025-10-10T19:53:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3375",
      "initial_release_date": "2021-08-31T08:56:13+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T08:56:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T08:56:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
                  "product_id": "RT-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
                  "product_id": "NFV-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
                  "product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2021:3088
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z source tree (BZ#1985050)\n\n* kernel-rt: Merge mm/memcg: Fix kmem_cache_alloc() performance regression (BZ#1987102)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3088",
        "url": "https://access.redhat.com/errata/RHSA-2021:3088"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3088.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:03+00:00",
      "generator": {
        "date": "2025-10-10T19:53:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3088",
      "initial_release_date": "2021-08-10T13:17:32+00:00",
      "revision_history": [
        {
          "date": "2021-08-10T13:17:32+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-10T13:17:32+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                  "product_id": "NFV-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                  "product_id": "RT-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
                  "product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:17:32+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3088"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:17:32+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3088"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:17:32+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3088"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    }
  ]
}
  rhsa-2021:3235
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a\nspecial build of Red Hat Enterprise Linux with only the packages required to\nhost virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe ()\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebase package(s) to version: 1.2.23\n\nHighlights, important fixes, or notable enhancements: \n\n* imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397)\n\n* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3235",
        "url": "https://access.redhat.com/errata/RHSA-2021:3235"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1956284",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1975142",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
      },
      {
        "category": "external",
        "summary": "1975177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975177"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1989397",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989397"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3235.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:06+00:00",
      "generator": {
        "date": "2025-10-10T19:53:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3235",
      "initial_release_date": "2021-08-19T15:51:36+00:00",
      "revision_history": [
        {
          "date": "2021-08-19T15:51:36+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-19T15:51:36+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "8Base-RHV-HypervisorBuild-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                  "product_id": "8Base-RHV-Hypervisor-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "imgbased-0:1.2.23-1.el8ev.src",
                "product": {
                  "name": "imgbased-0:1.2.23-1.el8ev.src",
                  "product_id": "imgbased-0:1.2.23-1.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
                  "product_id": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210804.0.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
                  "product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210804.0.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-4.el8ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "imgbased-0:1.2.23-1.el8ev.noarch",
                "product": {
                  "name": "imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_id": "imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
                "product": {
                  "name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_id": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-imgbased@1.2.23-1.el8ev?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch"
        },
        "product_reference": "imgbased-0:1.2.23-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "imgbased-0:1.2.23-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src"
        },
        "product_reference": "imgbased-0:1.2.23-1.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch"
        },
        "product_reference": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Cedric Buissart"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3621",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "discovery_date": "2021-06-23T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1975142"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "sssd: shell command injection in sssctl",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#1975142",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
        }
      ],
      "release_date": "2021-08-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "sssd: shell command injection in sssctl"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Laszlo Ersek"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-38575",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-05-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1956284"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in edk2. Missing checks in the IScsiHexToBin function in NetworkPkg/IScsiDxe lead to a buffer overflow allowing a remote attacker, who can inject himself in the communication between edk2 and the iSCSI target, to write arbitrary data to any address in the edk2 firmware and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-38575"
        },
        {
          "category": "external",
          "summary": "RHBZ#1956284",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38575",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-38575"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575"
        }
      ],
      "release_date": "2021-06-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe"
    }
  ]
}
  rhsa-2021:3725
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3725",
        "url": "https://access.redhat.com/errata/RHSA-2021:3725"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:13+00:00",
      "generator": {
        "date": "2025-10-10T19:53:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3725",
      "initial_release_date": "2021-10-05T07:56:00+00:00",
      "revision_history": [
        {
          "date": "2021-10-05T07:56:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-05T07:56:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                  "product_id": "7Server-optional-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-693.94.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-693.94.1.el7.src",
                  "product_id": "kernel-0:3.10.0-693.94.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_4000
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:4000",
        "url": "https://access.redhat.com/errata/RHSA-2021:4000"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4000.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2024-11-22T17:16:02+00:00",
      "generator": {
        "date": "2024-11-22T17:16:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:4000",
      "initial_release_date": "2021-10-26T16:28:07+00:00",
      "revision_history": [
        {
          "date": "2021-10-26T16:28:07+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-26T16:28:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:16:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-2.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T16:28:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4000"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T16:28:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4000"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_3802
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Indefinite waiting for RCU callback while removing cgroup (BZ#1967844)\n\n* kernel-rt: update to the latest RHEL7.9.z9 source tree (BZ#2002994)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3802",
        "url": "https://access.redhat.com/errata/RHSA-2021:3802"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1967844",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967844"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3802.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-15T11:56:29+00:00",
      "generator": {
        "date": "2024-11-15T11:56:29+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3802",
      "initial_release_date": "2021-10-12T15:39:56+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T15:39:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T15:39:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:56:29+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                  "product_id": "7Server-NFV-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                  "product_id": "7Server-RT-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
                  "product_id": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.45.1.rt56.1185.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
                  "product_id": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.45.1.rt56.1185.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:39:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3802"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:39:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3802"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:39:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3802"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  rhsa-2021:3044
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3044",
        "url": "https://access.redhat.com/errata/RHSA-2021:3044"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3044.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:03+00:00",
      "generator": {
        "date": "2025-10-10T19:53:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3044",
      "initial_release_date": "2021-08-10T11:21:13+00:00",
      "revision_history": [
        {
          "date": "2021-08-10T11:21:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-10T11:21:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
                  "product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T11:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3044"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T11:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3044"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T11:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3044"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    }
  ]
}
  RHSA-2021:3363
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e  25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3363",
        "url": "https://access.redhat.com/errata/RHSA-2021:3363"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:08+00:00",
      "generator": {
        "date": "2025-10-10T19:53:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3363",
      "initial_release_date": "2021-08-31T09:30:45+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T09:30:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T09:30:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                  "product_id": "BaseOS-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
                  "product_id": "CRB-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.src",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.src",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2021:3802
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Indefinite waiting for RCU callback while removing cgroup (BZ#1967844)\n\n* kernel-rt: update to the latest RHEL7.9.z9 source tree (BZ#2002994)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3802",
        "url": "https://access.redhat.com/errata/RHSA-2021:3802"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1967844",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967844"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3802.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:06+00:00",
      "generator": {
        "date": "2025-10-09T20:59:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3802",
      "initial_release_date": "2021-10-12T15:39:56+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T15:39:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T15:39:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                  "product_id": "7Server-NFV-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                  "product_id": "7Server-RT-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
                  "product_id": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.45.1.rt56.1185.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
                  "product_id": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.45.1.rt56.1185.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:39:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3802"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:39:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3802"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:39:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3802"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  RHSA-2021:3767
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3767",
        "url": "https://access.redhat.com/errata/RHSA-2021:3767"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3767.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:05+00:00",
      "generator": {
        "date": "2025-10-09T20:59:05+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3767",
      "initial_release_date": "2021-10-12T09:01:11+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T09:01:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T09:01:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:05+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                  "product_id": "7Server-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                  "product_id": "7Server-optional-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-327.101.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-327.101.1.el7.src",
                  "product_id": "kernel-0:3.10.0-327.101.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-327.101.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.101.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.101.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.src",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:01:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3767"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:01:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3767"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  rhsa-2021_3363
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e  25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3363",
        "url": "https://access.redhat.com/errata/RHSA-2021:3363"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-15T11:55:09+00:00",
      "generator": {
        "date": "2024-11-15T11:55:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3363",
      "initial_release_date": "2021-08-31T09:30:45+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T09:30:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T09:30:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:55:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                  "product_id": "BaseOS-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
                  "product_id": "CRB-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.src",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.src",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021_3380
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3380",
        "url": "https://access.redhat.com/errata/RHSA-2021:3380"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2024-11-15T11:55:32+00:00",
      "generator": {
        "date": "2024-11-15T11:55:32+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3380",
      "initial_release_date": "2021-08-31T09:18:03+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T09:18:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T09:18:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:55:32+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                  "product_id": "BaseOS-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021:3363
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e  25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3363",
        "url": "https://access.redhat.com/errata/RHSA-2021:3363"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:08+00:00",
      "generator": {
        "date": "2025-10-10T19:53:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3363",
      "initial_release_date": "2021-08-31T09:30:45+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T09:30:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T09:30:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                  "product_id": "BaseOS-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
                  "product_id": "CRB-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-193.64.1.el8_2.src",
                "product": {
                  "name": "kernel-0:4.18.0-193.64.1.el8_2.src",
                  "product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
          "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
        "relates_to_product_reference": "CRB-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
          "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
          "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:30:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3363"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
            "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
            "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2021:3057
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Urgent: Missing dptf_power.ko module in RHEL8 (BZ#1968381)\n\n* [mlx5] kdump over NFS fails: mlx5 driver gives error \"Stop room 95 is bigger than the SQ size 64\" (BZ#1969909)\n\n* BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth  hci_error_reset on intel-tigerlake-h01 (BZ#1972564)\n\n* Update CIFS to kernel 5.10 (BZ#1973637)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978710)\n\n* Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314)\n\n* Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613)\n\n* [RHEL8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250)\n\n* act_ct: subject to DNAT tuple collision (BZ#1982494)\n\nEnhancement(s):\n\n* [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3057",
        "url": "https://access.redhat.com/errata/RHSA-2021:3057"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3057.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:03+00:00",
      "generator": {
        "date": "2025-10-10T19:53:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3057",
      "initial_release_date": "2021-08-10T13:19:09+00:00",
      "revision_history": [
        {
          "date": "2021-08-10T13:19:09+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-10T13:19:09+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 8)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 8)",
                  "product_id": "CRB-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.src",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.src",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
                "product": {
                  "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_id": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.12.1.el8_4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_id": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.12.1.el8_4?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:19:09+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3057"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:19:09+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3057"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:19:09+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3057"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    }
  ]
}
  rhsa-2021:3088
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z source tree (BZ#1985050)\n\n* kernel-rt: Merge mm/memcg: Fix kmem_cache_alloc() performance regression (BZ#1987102)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3088",
        "url": "https://access.redhat.com/errata/RHSA-2021:3088"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3088.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:03+00:00",
      "generator": {
        "date": "2025-10-10T19:53:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3088",
      "initial_release_date": "2021-08-10T13:17:32+00:00",
      "revision_history": [
        {
          "date": "2021-08-10T13:17:32+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-10T13:17:32+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                  "product_id": "NFV-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                  "product_id": "RT-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
                  "product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:17:32+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3088"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:17:32+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3088"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:17:32+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3088"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    }
  ]
}
  RHSA-2021:3173
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3173",
        "url": "https://access.redhat.com/errata/RHSA-2021:3173"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:03+00:00",
      "generator": {
        "date": "2025-10-10T19:53:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3173",
      "initial_release_date": "2021-08-17T08:35:56+00:00",
      "revision_history": [
        {
          "date": "2021-08-17T08:35:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-17T08:35:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
                  "product_id": "CRB-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                  "product_id": "BaseOS-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.src",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.src",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:35:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3173"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:35:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3173"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:35:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3173"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2021:3766
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3766",
        "url": "https://access.redhat.com/errata/RHSA-2021:3766"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3766.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:05+00:00",
      "generator": {
        "date": "2025-10-09T20:59:05+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3766",
      "initial_release_date": "2021-10-12T07:47:11+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T07:47:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T07:47:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:05+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                  "product_id": "7Server-optional-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-514.93.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-514.93.1.el7.src",
                  "product_id": "kernel-0:3.10.0-514.93.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-514.93.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.93.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.93.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T07:47:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3766"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T07:47:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3766"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_3766
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3766",
        "url": "https://access.redhat.com/errata/RHSA-2021:3766"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3766.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2024-11-22T17:16:24+00:00",
      "generator": {
        "date": "2024-11-22T17:16:24+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3766",
      "initial_release_date": "2021-10-12T07:47:11+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T07:47:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T07:47:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:16:24+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                  "product_id": "7Server-optional-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-514.93.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-514.93.1.el7.src",
                  "product_id": "kernel-0:3.10.0-514.93.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-514.93.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.93.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.93.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T07:47:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3766"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T07:47:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3766"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_3801
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Kernel panic due to double fault with DLM reporting for socket error \"sk_err=32/0\" (BZ#1834878)\n\n* \"MFW indication via attention\" message getting logged frequently after every 5 minutes (BZ#1854544)\n\n* lpfc fails to discovery in pt2pt with \"2754 PRLI failure DID:0000EF Status:x9/x91e00, data: x0\" (BZ#1922479)\n\n* pcpu_get_vm_areas using most memory from VmallocUsed (BZ#1970618)\n\n* RHEL 7.9.z [qedf driver] Racing condition between qedf_cleanup_fcport and releasing command after timeout (BZ#1982702)\n\n* [Azure] RHEL 7.9 reports GPU/IB topology incorrectly on some Azure SKUs (BZ#1984128)\n\n* [stable guest ABI]Hot add CPU after migration cause guest hang (BZ#1991856)\n\n* i40e driver crash at  RIP: i40e_config_vf_promiscuous_mode+0x165 (BZ#1993850)\n\n* [nfs] Performance issue since commit 5a4f6f11951e (BZ#1995649)\n\n* [kernel] Indefinite waiting for RCU callback while removing cgroup (BZ#2000973)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3801",
        "url": "https://access.redhat.com/errata/RHSA-2021:3801"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3801.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T17:16:36+00:00",
      "generator": {
        "date": "2024-11-22T17:16:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3801",
      "initial_release_date": "2021-10-12T16:12:12+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T16:12:12+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T16:12:12+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:16:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.45.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.45.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021:3987
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free (CVE-2020-36385)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. (BZ#1980333)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3987",
        "url": "https://access.redhat.com/errata/RHSA-2021:3987"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1902788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1974319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3987.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T19:32:44+00:00",
      "generator": {
        "date": "2025-10-09T19:32:44+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3987",
      "initial_release_date": "2021-10-26T07:48:17+00:00",
      "revision_history": [
        {
          "date": "2021-10-26T07:48:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-26T07:48:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T19:32:44+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                  "product_id": "7Server-optional-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.59.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1062.59.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1062.59.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.59.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.59.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.59.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-20934",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-11-28T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1902788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in show_numa_stats function",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20934"
        },
        {
          "category": "external",
          "summary": "RHBZ#1902788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20934",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934"
        }
      ],
      "release_date": "2020-07-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "As the NUMA features are built-in and enabled by default, the NUMA functionality can be disabled at boot time by providing the kernel parameter, numa=off.\n\nThe method of providing this parameter depends on the operating system version, see KCS article https://access.redhat.com/solutions/23216.\n\nDisabling this feature may have significant performance impacts and the administrator should consider if the performance penalty is a problem.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in show_numa_stats function"
    },
    {
      "cve": "CVE-2020-36385",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-06-16T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1974319"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernels Userspace Connection Manager Access for RDMA.  This could allow a local attacker to crash the system, corrupt memory or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-36385"
        },
        {
          "category": "external",
          "summary": "RHBZ#1974319",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385"
        }
      ],
      "release_date": "2021-06-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_3814
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3814",
        "url": "https://access.redhat.com/errata/RHSA-2021:3814"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3814.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2024-11-22T17:15:45+00:00",
      "generator": {
        "date": "2024-11-22T17:15:45+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3814",
      "initial_release_date": "2021-10-12T15:14:01+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T15:14:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T15:14:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:15:45+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3814"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3814"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3814"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_3375
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3375",
        "url": "https://access.redhat.com/errata/RHSA-2021:3375"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-15T11:55:17+00:00",
      "generator": {
        "date": "2024-11-15T11:55:17+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3375",
      "initial_release_date": "2021-08-31T08:56:13+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T08:56:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T08:56:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:55:17+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
                  "product_id": "RT-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
                  "product_id": "NFV-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
                  "product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
          "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "NFV-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
          "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
        "relates_to_product_reference": "RT-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
          "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
          "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:56:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3375"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
            "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
            "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021:3812
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3812",
        "url": "https://access.redhat.com/errata/RHSA-2021:3812"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3812.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:14+00:00",
      "generator": {
        "date": "2025-10-10T19:53:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3812",
      "initial_release_date": "2021-10-12T15:19:06+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T15:19:06+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T15:19:06+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                  "product_id": "7Server-optional-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.84.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-957.84.1.el7.src",
                  "product_id": "kernel-0:3.10.0-957.84.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.84.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.84.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_3044
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3044",
        "url": "https://access.redhat.com/errata/RHSA-2021:3044"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3044.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2024-11-15T11:54:29+00:00",
      "generator": {
        "date": "2024-11-15T11:54:29+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3044",
      "initial_release_date": "2021-08-10T11:21:13+00:00",
      "revision_history": [
        {
          "date": "2021-08-10T11:21:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-10T11:21:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:54:29+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
                  "product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T11:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3044"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T11:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3044"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T11:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3044"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    }
  ]
}
  rhsa-2021_3173
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3173",
        "url": "https://access.redhat.com/errata/RHSA-2021:3173"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2024-11-15T11:55:05+00:00",
      "generator": {
        "date": "2024-11-15T11:55:05+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3173",
      "initial_release_date": "2021-08-17T08:35:56+00:00",
      "revision_history": [
        {
          "date": "2021-08-17T08:35:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-17T08:35:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:55:05+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
                  "product_id": "CRB-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                  "product_id": "BaseOS-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.src",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.src",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:35:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3173"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:35:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3173"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:35:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3173"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2022:5640
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:5640",
        "url": "https://access.redhat.com/errata/RHSA-2022:5640"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5640.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:20+00:00",
      "generator": {
        "date": "2025-10-09T20:59:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:5640",
      "initial_release_date": "2022-07-19T16:27:59+00:00",
      "revision_history": [
        {
          "date": "2022-07-19T16:27:59+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-07-19T16:27:59+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                  "product_id": "6Server-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
                  "product_id": "6Server-optional-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.src",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.src",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "perf-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "perf-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "python-perf-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "python-perf-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "python-perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "python-perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
                  "product_id": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.48.1.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
                  "product_id": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.48.1.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
                "product": {
                  "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
                  "product_id": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.48.1.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.src",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.src",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
          "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
          "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
          "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
          "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
          "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
          "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        ],
        "known_not_affected": [
          "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-07-19T16:27:59+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5640"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  RHSA-2021:4000
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:4000",
        "url": "https://access.redhat.com/errata/RHSA-2021:4000"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4000.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:10+00:00",
      "generator": {
        "date": "2025-10-09T20:59:10+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:4000",
      "initial_release_date": "2021-10-26T16:28:07+00:00",
      "revision_history": [
        {
          "date": "2021-10-26T16:28:07+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-26T16:28:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:10+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-2.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T16:28:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4000"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T16:28:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4000"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.src",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-1.el7.x86_64",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  RHSA-2021:3181
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3181",
        "url": "https://access.redhat.com/errata/RHSA-2021:3181"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:06+00:00",
      "generator": {
        "date": "2025-10-10T19:53:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3181",
      "initial_release_date": "2021-08-17T08:33:52+00:00",
      "revision_history": [
        {
          "date": "2021-08-17T08:33:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-17T08:33:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                  "product_id": "BaseOS-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:33:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3181"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:33:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3181"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:33:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3181"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2021:3768
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3768",
        "url": "https://access.redhat.com/errata/RHSA-2021:3768"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3768.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:09+00:00",
      "generator": {
        "date": "2025-10-09T20:59:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3768",
      "initial_release_date": "2021-10-12T09:39:47+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T09:39:47+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T09:39:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-10.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-10.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-10.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-9.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-9.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-4.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-2.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-7.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-7.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-7.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-7.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:39:47+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3768"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:39:47+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3768"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021:3768
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3768",
        "url": "https://access.redhat.com/errata/RHSA-2021:3768"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3768.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:09+00:00",
      "generator": {
        "date": "2025-10-09T20:59:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3768",
      "initial_release_date": "2021-10-12T09:39:47+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T09:39:47+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T09:39:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-10.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-10.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-10.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-9.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-9.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-4.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-2.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-7.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-7.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-7.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-7.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:39:47+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3768"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:39:47+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3768"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  RHSA-2021:3044
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3044",
        "url": "https://access.redhat.com/errata/RHSA-2021:3044"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3044.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:03+00:00",
      "generator": {
        "date": "2025-10-10T19:53:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3044",
      "initial_release_date": "2021-08-10T11:21:13+00:00",
      "revision_history": [
        {
          "date": "2021-08-10T11:21:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-10T11:21:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
                  "product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
                  "product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T11:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3044"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T11:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3044"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T11:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3044"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    }
  ]
}
  RHSA-2021:3812
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3812",
        "url": "https://access.redhat.com/errata/RHSA-2021:3812"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3812.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:14+00:00",
      "generator": {
        "date": "2025-10-10T19:53:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3812",
      "initial_release_date": "2021-10-12T15:19:06+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T15:19:06+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T15:19:06+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                  "product_id": "7Server-optional-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.84.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-957.84.1.el7.src",
                  "product_id": "kernel-0:3.10.0-957.84.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.84.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.84.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021:3802
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Indefinite waiting for RCU callback while removing cgroup (BZ#1967844)\n\n* kernel-rt: update to the latest RHEL7.9.z9 source tree (BZ#2002994)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3802",
        "url": "https://access.redhat.com/errata/RHSA-2021:3802"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1967844",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967844"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3802.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:06+00:00",
      "generator": {
        "date": "2025-10-09T20:59:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3802",
      "initial_release_date": "2021-10-12T15:39:56+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T15:39:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T15:39:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                  "product_id": "7Server-NFV-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                  "product_id": "7Server-RT-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
                  "product_id": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.45.1.rt56.1185.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.45.1.rt56.1185.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
                  "product_id": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.45.1.rt56.1185.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:39:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3802"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:39:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3802"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:39:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3802"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.45.1.rt56.1185.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.45.1.rt56.1185.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  rhsa-2021_3987
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free (CVE-2020-36385)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. (BZ#1980333)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3987",
        "url": "https://access.redhat.com/errata/RHSA-2021:3987"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1902788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1974319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3987.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T17:15:52+00:00",
      "generator": {
        "date": "2024-11-22T17:15:52+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3987",
      "initial_release_date": "2021-10-26T07:48:17+00:00",
      "revision_history": [
        {
          "date": "2021-10-26T07:48:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-26T07:48:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:15:52+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                  "product_id": "7Server-optional-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.59.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1062.59.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1062.59.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.59.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.59.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.59.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-20934",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-11-28T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1902788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in show_numa_stats function",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20934"
        },
        {
          "category": "external",
          "summary": "RHBZ#1902788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20934",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934"
        }
      ],
      "release_date": "2020-07-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "As the NUMA features are built-in and enabled by default, the NUMA functionality can be disabled at boot time by providing the kernel parameter, numa=off.\n\nThe method of providing this parameter depends on the operating system version, see KCS article https://access.redhat.com/solutions/23216.\n\nDisabling this feature may have significant performance impacts and the administrator should consider if the performance penalty is a problem.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in show_numa_stats function"
    },
    {
      "cve": "CVE-2020-36385",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-06-16T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1974319"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernels Userspace Connection Manager Access for RDMA.  This could allow a local attacker to crash the system, corrupt memory or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-36385"
        },
        {
          "category": "external",
          "summary": "RHBZ#1974319",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385"
        }
      ],
      "release_date": "2021-06-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_3943
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Red Hat Virtualization Host has been rebased on Red Hat Enterprise Linux 7.9 Batch #9. (BZ#2010171)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3943",
        "url": "https://access.redhat.com/errata/RHSA-2021:3943"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "2010171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010171"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3943.json"
      }
    ],
    "title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.19",
    "tracking": {
      "current_release_date": "2024-11-15T11:57:32+00:00",
      "generator": {
        "date": "2024-11-15T11:57:32+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3943",
      "initial_release_date": "2021-10-20T09:54:00+00:00",
      "revision_history": [
        {
          "date": "2021-10-20T09:54:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-20T09:54:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:57:32+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "7Server-RHEV-4-HypervisorBuild-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                  "product_id": "7Server-RHEV-4-Hypervisor-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.19-1.el7ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
                  "product_id": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.19-20211013.0.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.19-1.el7ev?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.19-1.el7ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
                  "product_id": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.19-20211013.0.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
        ],
        "known_not_affected": [
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-20T09:54:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3943"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  rhsa-2021:3801
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Kernel panic due to double fault with DLM reporting for socket error \"sk_err=32/0\" (BZ#1834878)\n\n* \"MFW indication via attention\" message getting logged frequently after every 5 minutes (BZ#1854544)\n\n* lpfc fails to discovery in pt2pt with \"2754 PRLI failure DID:0000EF Status:x9/x91e00, data: x0\" (BZ#1922479)\n\n* pcpu_get_vm_areas using most memory from VmallocUsed (BZ#1970618)\n\n* RHEL 7.9.z [qedf driver] Racing condition between qedf_cleanup_fcport and releasing command after timeout (BZ#1982702)\n\n* [Azure] RHEL 7.9 reports GPU/IB topology incorrectly on some Azure SKUs (BZ#1984128)\n\n* [stable guest ABI]Hot add CPU after migration cause guest hang (BZ#1991856)\n\n* i40e driver crash at  RIP: i40e_config_vf_promiscuous_mode+0x165 (BZ#1993850)\n\n* [nfs] Performance issue since commit 5a4f6f11951e (BZ#1995649)\n\n* [kernel] Indefinite waiting for RCU callback while removing cgroup (BZ#2000973)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3801",
        "url": "https://access.redhat.com/errata/RHSA-2021:3801"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3801.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:06+00:00",
      "generator": {
        "date": "2025-10-09T20:59:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3801",
      "initial_release_date": "2021-10-12T16:12:12+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T16:12:12+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T16:12:12+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.45.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.45.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_3768
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3768",
        "url": "https://access.redhat.com/errata/RHSA-2021:3768"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3768.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2024-11-22T17:16:30+00:00",
      "generator": {
        "date": "2024-11-22T17:16:30+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3768",
      "initial_release_date": "2021-10-12T09:39:47+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T09:39:47+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T09:39:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:16:30+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-10.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-10.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-10.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-9.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-9.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-4.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-2.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-10.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-9.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-7.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-7.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-10.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-9.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-7.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-7.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:39:47+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3768"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
          "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:39:47+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3768"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-9.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-7.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-4.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-1.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.src",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-10.el7.x86_64",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.ppc64le",
            "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-10.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021:3173
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3173",
        "url": "https://access.redhat.com/errata/RHSA-2021:3173"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:03+00:00",
      "generator": {
        "date": "2025-10-10T19:53:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3173",
      "initial_release_date": "2021-08-17T08:35:56+00:00",
      "revision_history": [
        {
          "date": "2021-08-17T08:35:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-17T08:35:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
                  "product_id": "CRB-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                  "product_id": "BaseOS-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-147.52.1.el8_1.src",
                "product": {
                  "name": "kernel-0:4.18.0-147.52.1.el8_1.src",
                  "product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
          "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
        "relates_to_product_reference": "CRB-8.1.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:35:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3173"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:35:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3173"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
          "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
          "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:35:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3173"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
            "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
            "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2021:3943
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Red Hat Virtualization Host has been rebased on Red Hat Enterprise Linux 7.9 Batch #9. (BZ#2010171)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3943",
        "url": "https://access.redhat.com/errata/RHSA-2021:3943"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "2010171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010171"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3943.json"
      }
    ],
    "title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.19",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:11+00:00",
      "generator": {
        "date": "2025-10-09T20:59:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3943",
      "initial_release_date": "2021-10-20T09:54:00+00:00",
      "revision_history": [
        {
          "date": "2021-10-20T09:54:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-20T09:54:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "7Server-RHEV-4-HypervisorBuild-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                  "product_id": "7Server-RHEV-4-Hypervisor-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.19-1.el7ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
                  "product_id": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.19-20211013.0.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.19-1.el7ev?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.19-1.el7ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
                  "product_id": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.19-20211013.0.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
        ],
        "known_not_affected": [
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-20T09:54:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3943"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  rhsa-2021:3814
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3814",
        "url": "https://access.redhat.com/errata/RHSA-2021:3814"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3814.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:14+00:00",
      "generator": {
        "date": "2025-10-10T19:53:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3814",
      "initial_release_date": "2021-10-12T15:14:01+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T15:14:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T15:14:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
                "product": {
                  "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        },
        "product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3814"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3814"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
          "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3814"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
            "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021:3380
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3380",
        "url": "https://access.redhat.com/errata/RHSA-2021:3380"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:11+00:00",
      "generator": {
        "date": "2025-10-10T19:53:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3380",
      "initial_release_date": "2021-08-31T09:18:03+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T09:18:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T09:18:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                  "product_id": "BaseOS-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
                  "product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T09:18:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3380"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021_3725
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3725",
        "url": "https://access.redhat.com/errata/RHSA-2021:3725"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T17:16:18+00:00",
      "generator": {
        "date": "2024-11-22T17:16:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3725",
      "initial_release_date": "2021-10-05T07:56:00+00:00",
      "revision_history": [
        {
          "date": "2021-10-05T07:56:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-05T07:56:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:16:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                  "product_id": "7Server-optional-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-693.94.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-693.94.1.el7.src",
                  "product_id": "kernel-0:3.10.0-693.94.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  RHSA-2021:3235
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a\nspecial build of Red Hat Enterprise Linux with only the packages required to\nhost virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe ()\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebase package(s) to version: 1.2.23\n\nHighlights, important fixes, or notable enhancements: \n\n* imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397)\n\n* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3235",
        "url": "https://access.redhat.com/errata/RHSA-2021:3235"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1956284",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1975142",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
      },
      {
        "category": "external",
        "summary": "1975177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975177"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1989397",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989397"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3235.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:06+00:00",
      "generator": {
        "date": "2025-10-10T19:53:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3235",
      "initial_release_date": "2021-08-19T15:51:36+00:00",
      "revision_history": [
        {
          "date": "2021-08-19T15:51:36+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-19T15:51:36+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "8Base-RHV-HypervisorBuild-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                  "product_id": "8Base-RHV-Hypervisor-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "imgbased-0:1.2.23-1.el8ev.src",
                "product": {
                  "name": "imgbased-0:1.2.23-1.el8ev.src",
                  "product_id": "imgbased-0:1.2.23-1.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
                  "product_id": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210804.0.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
                  "product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210804.0.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-4.el8ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "imgbased-0:1.2.23-1.el8ev.noarch",
                "product": {
                  "name": "imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_id": "imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
                "product": {
                  "name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_id": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-imgbased@1.2.23-1.el8ev?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch"
        },
        "product_reference": "imgbased-0:1.2.23-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "imgbased-0:1.2.23-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src"
        },
        "product_reference": "imgbased-0:1.2.23-1.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch"
        },
        "product_reference": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Cedric Buissart"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3621",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "discovery_date": "2021-06-23T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1975142"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "sssd: shell command injection in sssctl",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#1975142",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
        }
      ],
      "release_date": "2021-08-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "sssd: shell command injection in sssctl"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Laszlo Ersek"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-38575",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-05-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1956284"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in edk2. Missing checks in the IScsiHexToBin function in NetworkPkg/IScsiDxe lead to a buffer overflow allowing a remote attacker, who can inject himself in the communication between edk2 and the iSCSI target, to write arbitrary data to any address in the edk2 firmware and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-38575"
        },
        {
          "category": "external",
          "summary": "RHBZ#1956284",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38575",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-38575"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575"
        }
      ],
      "release_date": "2021-06-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe"
    }
  ]
}
  rhsa-2021_3235
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a\nspecial build of Red Hat Enterprise Linux with only the packages required to\nhost virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe ()\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebase package(s) to version: 1.2.23\n\nHighlights, important fixes, or notable enhancements: \n\n* imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397)\n\n* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3235",
        "url": "https://access.redhat.com/errata/RHSA-2021:3235"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1956284",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1975142",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
      },
      {
        "category": "external",
        "summary": "1975177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975177"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1989397",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989397"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3235.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
    "tracking": {
      "current_release_date": "2024-11-22T17:14:33+00:00",
      "generator": {
        "date": "2024-11-22T17:14:33+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3235",
      "initial_release_date": "2021-08-19T15:51:36+00:00",
      "revision_history": [
        {
          "date": "2021-08-19T15:51:36+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-19T15:51:36+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:14:33+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "8Base-RHV-HypervisorBuild-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                  "product_id": "8Base-RHV-Hypervisor-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "imgbased-0:1.2.23-1.el8ev.src",
                "product": {
                  "name": "imgbased-0:1.2.23-1.el8ev.src",
                  "product_id": "imgbased-0:1.2.23-1.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
                  "product_id": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210804.0.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
                  "product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210804.0.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-4.el8ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "imgbased-0:1.2.23-1.el8ev.noarch",
                "product": {
                  "name": "imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_id": "imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
                "product": {
                  "name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_id": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-imgbased@1.2.23-1.el8ev?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch"
        },
        "product_reference": "imgbased-0:1.2.23-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "imgbased-0:1.2.23-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src"
        },
        "product_reference": "imgbased-0:1.2.23-1.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch"
        },
        "product_reference": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Cedric Buissart"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3621",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "discovery_date": "2021-06-23T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1975142"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "sssd: shell command injection in sssctl",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#1975142",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
        }
      ],
      "release_date": "2021-08-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "sssd: shell command injection in sssctl"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Laszlo Ersek"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-38575",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-05-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1956284"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in edk2. Missing checks in the IScsiHexToBin function in NetworkPkg/IScsiDxe lead to a buffer overflow allowing a remote attacker, who can inject himself in the communication between edk2 and the iSCSI target, to write arbitrary data to any address in the edk2 firmware and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-38575"
        },
        {
          "category": "external",
          "summary": "RHBZ#1956284",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38575",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-38575"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575"
        }
      ],
      "release_date": "2021-06-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-19T15:51:36+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3235"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe"
    }
  ]
}
  rhsa-2021:3943
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Red Hat Virtualization Host has been rebased on Red Hat Enterprise Linux 7.9 Batch #9. (BZ#2010171)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3943",
        "url": "https://access.redhat.com/errata/RHSA-2021:3943"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "2010171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010171"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3943.json"
      }
    ],
    "title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.19",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:11+00:00",
      "generator": {
        "date": "2025-10-09T20:59:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3943",
      "initial_release_date": "2021-10-20T09:54:00+00:00",
      "revision_history": [
        {
          "date": "2021-10-20T09:54:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-20T09:54:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "7Server-RHEV-4-HypervisorBuild-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                  "product_id": "7Server-RHEV-4-Hypervisor-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.19-1.el7ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
                  "product_id": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.19-20211013.0.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.19-1.el7ev?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.19-1.el7ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
                  "product_id": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.19-20211013.0.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
        ],
        "known_not_affected": [
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-20T09:54:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3943"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.19-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.19-20211013.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.19-20211013.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.19-1.el7ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  rhsa-2021_3767
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3767",
        "url": "https://access.redhat.com/errata/RHSA-2021:3767"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3767.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2024-11-15T11:57:13+00:00",
      "generator": {
        "date": "2024-11-15T11:57:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3767",
      "initial_release_date": "2021-10-12T09:01:11+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T09:01:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T09:01:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:57:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                  "product_id": "7Server-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                  "product_id": "7Server-optional-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-327.101.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-327.101.1.el7.src",
                  "product_id": "kernel-0:3.10.0-327.101.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-327.101.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.101.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.101.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.src",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:01:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3767"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:01:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3767"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  rhsa-2021_3088
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z source tree (BZ#1985050)\n\n* kernel-rt: Merge mm/memcg: Fix kmem_cache_alloc() performance regression (BZ#1987102)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3088",
        "url": "https://access.redhat.com/errata/RHSA-2021:3088"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3088.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-15T11:54:17+00:00",
      "generator": {
        "date": "2024-11-15T11:54:17+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3088",
      "initial_release_date": "2021-08-10T13:17:32+00:00",
      "revision_history": [
        {
          "date": "2021-08-10T13:17:32+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-10T13:17:32+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:54:17+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                  "product_id": "NFV-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                  "product_id": "RT-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
                  "product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
        "relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:17:32+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3088"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:17:32+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3088"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
          "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:17:32+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3088"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
            "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    }
  ]
}
  RHSA-2021:3987
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free (CVE-2020-36385)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. (BZ#1980333)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3987",
        "url": "https://access.redhat.com/errata/RHSA-2021:3987"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1902788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1974319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3987.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T19:32:44+00:00",
      "generator": {
        "date": "2025-10-09T19:32:44+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3987",
      "initial_release_date": "2021-10-26T07:48:17+00:00",
      "revision_history": [
        {
          "date": "2021-10-26T07:48:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-26T07:48:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T19:32:44+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                  "product_id": "7Server-optional-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.59.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.59.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1062.59.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1062.59.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.59.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.59.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.59.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.59.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-20934",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-11-28T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1902788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in show_numa_stats function",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20934"
        },
        {
          "category": "external",
          "summary": "RHBZ#1902788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20934",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934"
        }
      ],
      "release_date": "2020-07-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "As the NUMA features are built-in and enabled by default, the NUMA functionality can be disabled at boot time by providing the kernel parameter, numa=off.\n\nThe method of providing this parameter depends on the operating system version, see KCS article https://access.redhat.com/solutions/23216.\n\nDisabling this feature may have significant performance impacts and the administrator should consider if the performance penalty is a problem.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in show_numa_stats function"
    },
    {
      "cve": "CVE-2020-36385",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-06-16T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1974319"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernels Userspace Connection Manager Access for RDMA.  This could allow a local attacker to crash the system, corrupt memory or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-36385"
        },
        {
          "category": "external",
          "summary": "RHBZ#1974319",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385"
        }
      ],
      "release_date": "2021-06-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-26T07:48:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3987"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.59.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.59.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.59.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021_3057
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Urgent: Missing dptf_power.ko module in RHEL8 (BZ#1968381)\n\n* [mlx5] kdump over NFS fails: mlx5 driver gives error \"Stop room 95 is bigger than the SQ size 64\" (BZ#1969909)\n\n* BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth  hci_error_reset on intel-tigerlake-h01 (BZ#1972564)\n\n* Update CIFS to kernel 5.10 (BZ#1973637)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978710)\n\n* Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314)\n\n* Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613)\n\n* [RHEL8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250)\n\n* act_ct: subject to DNAT tuple collision (BZ#1982494)\n\nEnhancement(s):\n\n* [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3057",
        "url": "https://access.redhat.com/errata/RHSA-2021:3057"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3057.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-15T11:54:35+00:00",
      "generator": {
        "date": "2024-11-15T11:54:35+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3057",
      "initial_release_date": "2021-08-10T13:19:09+00:00",
      "revision_history": [
        {
          "date": "2021-08-10T13:19:09+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-10T13:19:09+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:54:35+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 8)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 8)",
                  "product_id": "CRB-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.src",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.src",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
                "product": {
                  "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_id": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.12.1.el8_4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_id": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.12.1.el8_4?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:19:09+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3057"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:19:09+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3057"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:19:09+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3057"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    }
  ]
}
  rhsa-2021_3181
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3181",
        "url": "https://access.redhat.com/errata/RHSA-2021:3181"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2024-11-15T11:55:14+00:00",
      "generator": {
        "date": "2024-11-15T11:55:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3181",
      "initial_release_date": "2021-08-17T08:33:52+00:00",
      "revision_history": [
        {
          "date": "2021-08-17T08:33:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-17T08:33:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:55:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                  "product_id": "BaseOS-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:33:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3181"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:33:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3181"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:33:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3181"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021_3812
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3812",
        "url": "https://access.redhat.com/errata/RHSA-2021:3812"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3812.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2024-11-22T17:15:37+00:00",
      "generator": {
        "date": "2024-11-22T17:15:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3812",
      "initial_release_date": "2021-10-12T15:19:06+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T15:19:06+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T15:19:06+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:15:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                  "product_id": "7Server-optional-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.84.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-957.84.1.el7.src",
                  "product_id": "kernel-0:3.10.0-957.84.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.84.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.84.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T15:19:06+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3812"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021:3767
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3767",
        "url": "https://access.redhat.com/errata/RHSA-2021:3767"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3767.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:05+00:00",
      "generator": {
        "date": "2025-10-09T20:59:05+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3767",
      "initial_release_date": "2021-10-12T09:01:11+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T09:01:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T09:01:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:05+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                  "product_id": "7Server-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                  "product_id": "7Server-optional-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-327.101.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-327.101.1.el7.src",
                  "product_id": "kernel-0:3.10.0-327.101.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-327.101.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.101.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.101.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.101.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.src",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-327.101.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-327.101.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:01:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3767"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
          "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
          "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
          "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T09:01:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3767"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.src",
            "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.101.1.el7.noarch",
            "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.101.1.el7.x86_64",
            "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.101.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  RHSA-2021:3801
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Kernel panic due to double fault with DLM reporting for socket error \"sk_err=32/0\" (BZ#1834878)\n\n* \"MFW indication via attention\" message getting logged frequently after every 5 minutes (BZ#1854544)\n\n* lpfc fails to discovery in pt2pt with \"2754 PRLI failure DID:0000EF Status:x9/x91e00, data: x0\" (BZ#1922479)\n\n* pcpu_get_vm_areas using most memory from VmallocUsed (BZ#1970618)\n\n* RHEL 7.9.z [qedf driver] Racing condition between qedf_cleanup_fcport and releasing command after timeout (BZ#1982702)\n\n* [Azure] RHEL 7.9 reports GPU/IB topology incorrectly on some Azure SKUs (BZ#1984128)\n\n* [stable guest ABI]Hot add CPU after migration cause guest hang (BZ#1991856)\n\n* i40e driver crash at  RIP: i40e_config_vf_promiscuous_mode+0x165 (BZ#1993850)\n\n* [nfs] Performance issue since commit 5a4f6f11951e (BZ#1995649)\n\n* [kernel] Indefinite waiting for RCU callback while removing cgroup (BZ#2000973)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3801",
        "url": "https://access.redhat.com/errata/RHSA-2021:3801"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1983686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
      },
      {
        "category": "external",
        "summary": "1983988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3801.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:06+00:00",
      "generator": {
        "date": "2025-10-09T20:59:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3801",
      "initial_release_date": "2021-10-12T16:12:12+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T16:12:12+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T16:12:12+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.45.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.45.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.45.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.45.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.45.1.el7?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.45.1.el7?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3653",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maxim Levitsky",
            "Paolo Bonzini"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2021-3656",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "discovery_date": "2021-07-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1983988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "RHBZ#1983988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
        }
      ],
      "release_date": "2021-08-16T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:12:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3801"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.45.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.45.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.45.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021:3057
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Urgent: Missing dptf_power.ko module in RHEL8 (BZ#1968381)\n\n* [mlx5] kdump over NFS fails: mlx5 driver gives error \"Stop room 95 is bigger than the SQ size 64\" (BZ#1969909)\n\n* BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth  hci_error_reset on intel-tigerlake-h01 (BZ#1972564)\n\n* Update CIFS to kernel 5.10 (BZ#1973637)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978710)\n\n* Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314)\n\n* Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613)\n\n* [RHEL8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250)\n\n* act_ct: subject to DNAT tuple collision (BZ#1982494)\n\nEnhancement(s):\n\n* [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3057",
        "url": "https://access.redhat.com/errata/RHSA-2021:3057"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1971651",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3057.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:03+00:00",
      "generator": {
        "date": "2025-10-10T19:53:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3057",
      "initial_release_date": "2021-08-10T13:19:09+00:00",
      "revision_history": [
        {
          "date": "2021-08-10T13:19:09+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-10T13:19:09+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 8)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 8)",
                  "product_id": "CRB-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.12.1.el8_4.src",
                "product": {
                  "name": "kernel-0:4.18.0-305.12.1.el8_4.src",
                  "product_id": "kernel-0:4.18.0-305.12.1.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
                "product": {
                  "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_id": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.12.1.el8_4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_id": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.12.1.el8_4?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
        "relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Norbert Slusarek"
          ]
        }
      ],
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1971651"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "RHBZ#1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2021-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:19:09+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3057"
        },
        {
          "category": "workaround",
          "details": "As the CAN module will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
    },
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:19:09+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3057"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
          "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-10T13:19:09+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3057"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
            "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    }
  ]
}
  rhsa-2022_5640
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:5640",
        "url": "https://access.redhat.com/errata/RHSA-2022:5640"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5640.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2024-11-15T12:01:59+00:00",
      "generator": {
        "date": "2024-11-15T12:01:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:5640",
      "initial_release_date": "2022-07-19T16:27:59+00:00",
      "revision_history": [
        {
          "date": "2022-07-19T16:27:59+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-07-19T16:27:59+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T12:01:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                  "product_id": "6Server-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
                  "product_id": "6Server-optional-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.src",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.src",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
                "product": {
                  "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_id": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.48.1.el6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "perf-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "perf-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.48.1.el6.i686",
                "product": {
                  "name": "python-perf-0:2.6.32-754.48.1.el6.i686",
                  "product_id": "python-perf-0:2.6.32-754.48.1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.48.1.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.48.1.el6.s390x",
                "product": {
                  "name": "python-perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_id": "python-perf-0:2.6.32-754.48.1.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.48.1.el6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
                  "product_id": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.48.1.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
                  "product_id": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.48.1.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
                "product": {
                  "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
                  "product_id": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.48.1.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.src",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.src",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch"
        },
        "product_reference": "kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
        "relates_to_product_reference": "6Server-optional-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
          "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
          "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
          "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
          "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
          "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
          "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
          "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
          "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
          "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
        ],
        "known_not_affected": [
          "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
          "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
          "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
          "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
          "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
          "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-07-19T16:27:59+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5640"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-headers-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.src",
            "6Server-optional-ELS:kernel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-devel-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:kernel-doc-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.48.1.el6.noarch",
            "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-0:2.6.32-754.48.1.el6.x86_64",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.i686",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.s390x",
            "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.48.1.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    }
  ]
}
  RHSA-2021:3725
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3725",
        "url": "https://access.redhat.com/errata/RHSA-2021:3725"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:13+00:00",
      "generator": {
        "date": "2025-10-10T19:53:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3725",
      "initial_release_date": "2021-10-05T07:56:00+00:00",
      "revision_history": [
        {
          "date": "2021-10-05T07:56:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-05T07:56:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                  "product_id": "7Server-optional-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-693.94.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-693.94.1.el7.src",
                  "product_id": "kernel-0:3.10.0-693.94.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
          "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
          "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
          "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-05T07:56:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3725"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
            "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
            "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
            "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  rhsa-2021:3181
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3181",
        "url": "https://access.redhat.com/errata/RHSA-2021:3181"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch security update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:06+00:00",
      "generator": {
        "date": "2025-10-10T19:53:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3181",
      "initial_release_date": "2021-08-17T08:33:52+00:00",
      "revision_history": [
        {
          "date": "2021-08-17T08:33:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-17T08:33:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
                  "product_id": "BaseOS-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
                "product": {
                  "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
                  "product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        },
        "product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:33:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3181"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:33:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3181"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
          "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-17T08:33:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3181"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
            "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021:3766
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3766",
        "url": "https://access.redhat.com/errata/RHSA-2021:3766"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1965461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
      },
      {
        "category": "external",
        "summary": "1986506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3766.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:59:05+00:00",
      "generator": {
        "date": "2025-10-09T20:59:05+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3766",
      "initial_release_date": "2021-10-12T07:47:11+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T07:47:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T07:47:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:59:05+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                  "product_id": "7Server-optional-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-514.93.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-514.93.1.el7.src",
                  "product_id": "kernel-0:3.10.0-514.93.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-514.93.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.93.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.93.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.93.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-514.93.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-514.93.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2021-05-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1965461"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7.  In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1965461",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
        }
      ],
      "release_date": "2021-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T07:47:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3766"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
    },
    {
      "cve": "CVE-2021-37576",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-06-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1986506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
          "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
          "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
          "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "RHBZ#1986506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
        }
      ],
      "release_date": "2021-07-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T07:47:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3766"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.src",
            "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.93.1.el7.noarch",
            "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.93.1.el7.x86_64",
            "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.93.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
    }
  ]
}
  suse-su-2021:3969-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\nUnprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0.\n  (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2018-3639: Fixed a speculative execution that may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. (bsc#1087082)\n- CVE-2021-20320: Fix a bug that allows a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem. (bsc#1190601)\n- CVE-2021-0941: Fixed A missing sanity check to the current MTU check that may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. (bnc#1192045)\n- CVE-2021-31916: Fixed a bound check failure that could allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem. (bnc#1192781)\n- CVE-2021-20322: Fixed a bug that provides to an attacker the ability to quickly scan open UDP ports. (bsc#1191790)\n- CVE-2021-3772: Fixed an issue that would allow a blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses. (bsc#1190351)\n- CVE-2021-34981: Fixed an issue that allows an attacker with a local account to escalate privileges when CAPI (ISDN) hardware connection fails. (bsc#1191961)\n- CVE-2018-9517: Fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).\n- CVE-2019-3874: Fixed possible denial of service attack via SCTP socket buffer used by a userspace applications (bnc#1129898).\n- CVE-2019-3900: Fixed an infinite loop issue while handling incoming packets in handle_rx() (bnc#1133374).\n- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).\n- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-33033: Fixed a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled (bsc#1186109).\n- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).\n- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).\n- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).\n- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2021-37159: Fixed use-after-free and a double free inside hso_free_net_device in drivers/net/usb/hso.c when unregister_netdev is called without checking for the NETREG_REGISTERED state (bnc#1188601).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)\n- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel\u0027s bluetooth module. (bsc#1190023)\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)\n- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).\n- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).\n- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).\n\nThe following non-security bugs were fixed:\n\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22913)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22913).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).\n- drm: fix spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- gigaset: fix spectre issue in do_data_b3_req (bsc#1192802).\n- hisax: fix spectre issues (bsc#1192802).\n- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).\n- hysdn: fix spectre issue in hycapi_send_message (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).\n- iwlwifi: fix spectre issue in iwl_dbgfs_update_pm (bsc#1192802).\n- media: dvb_ca_en50221: prevent using slot_info for Spectre attacs (bsc#1192802).\n- media: dvb_ca_en50221: sanity check slot number from userspace (bsc#1192802).\n- media: wl128x: get rid of a potential spectre issue (bsc#1192802).\n- memcg: enable accounting for file lock caches (bsc#1190115).\n- mpt3sas: fix spectre issues (bsc#1192802).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).\n- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).\n- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).\n- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n- net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() (bsc#1192802).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- objtool: Do not fail on missing symbol table (bsc#1192379).\n- osst: fix spectre issue in osst_verify_frame (bsc#1192802).\n- ovl: check whiteout in ovl_create_over_whiteout() (bsc#1189846).\n- ovl: filter of trusted xattr results in audit (bsc#1189846).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1189846).\n- ovl: initialize error in ovl_copy_xattr (bsc#1189846).\n- ovl: relax WARN_ON() on rename to self (bsc#1189846).\n- s390/bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).\n- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).\n- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).\n- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sysvipc/sem: mitigate semnum index against spectre v1 (bsc#1192802).\n- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-3969,SUSE-SLE-Module-Live-Patching-15-2021-3969,SUSE-SLE-Product-HA-15-2021-3969,SUSE-SLE-Product-HPC-15-2021-3969,SUSE-SLE-Product-SLES-15-2021-3969,SUSE-SLE-Product-SLES_SAP-15-2021-3969",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3969-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:3969-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213969-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:3969-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085235",
        "url": "https://bugzilla.suse.com/1085235"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085308",
        "url": "https://bugzilla.suse.com/1085308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087078",
        "url": "https://bugzilla.suse.com/1087078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087082",
        "url": "https://bugzilla.suse.com/1087082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1100394",
        "url": "https://bugzilla.suse.com/1100394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1102640",
        "url": "https://bugzilla.suse.com/1102640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105412",
        "url": "https://bugzilla.suse.com/1105412"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1108488",
        "url": "https://bugzilla.suse.com/1108488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129898",
        "url": "https://bugzilla.suse.com/1129898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133374",
        "url": "https://bugzilla.suse.com/1133374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171420",
        "url": "https://bugzilla.suse.com/1171420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173489",
        "url": "https://bugzilla.suse.com/1173489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174161",
        "url": "https://bugzilla.suse.com/1174161"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181854",
        "url": "https://bugzilla.suse.com/1181854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185726",
        "url": "https://bugzilla.suse.com/1185726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185758",
        "url": "https://bugzilla.suse.com/1185758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186109",
        "url": "https://bugzilla.suse.com/1186109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188172",
        "url": "https://bugzilla.suse.com/1188172"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188563",
        "url": "https://bugzilla.suse.com/1188563"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188601",
        "url": "https://bugzilla.suse.com/1188601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188983",
        "url": "https://bugzilla.suse.com/1188983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188985",
        "url": "https://bugzilla.suse.com/1188985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189057",
        "url": "https://bugzilla.suse.com/1189057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189262",
        "url": "https://bugzilla.suse.com/1189262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189291",
        "url": "https://bugzilla.suse.com/1189291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189399",
        "url": "https://bugzilla.suse.com/1189399"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189400",
        "url": "https://bugzilla.suse.com/1189400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189706",
        "url": "https://bugzilla.suse.com/1189706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189846",
        "url": "https://bugzilla.suse.com/1189846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189884",
        "url": "https://bugzilla.suse.com/1189884"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190023",
        "url": "https://bugzilla.suse.com/1190023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190025",
        "url": "https://bugzilla.suse.com/1190025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190067",
        "url": "https://bugzilla.suse.com/1190067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190117",
        "url": "https://bugzilla.suse.com/1190117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190159",
        "url": "https://bugzilla.suse.com/1190159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190351",
        "url": "https://bugzilla.suse.com/1190351"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190479",
        "url": "https://bugzilla.suse.com/1190479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190534",
        "url": "https://bugzilla.suse.com/1190534"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190601",
        "url": "https://bugzilla.suse.com/1190601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190717",
        "url": "https://bugzilla.suse.com/1190717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191193",
        "url": "https://bugzilla.suse.com/1191193"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191315",
        "url": "https://bugzilla.suse.com/1191315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191317",
        "url": "https://bugzilla.suse.com/1191317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191790",
        "url": "https://bugzilla.suse.com/1191790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191800",
        "url": "https://bugzilla.suse.com/1191800"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191961",
        "url": "https://bugzilla.suse.com/1191961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192045",
        "url": "https://bugzilla.suse.com/1192045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192267",
        "url": "https://bugzilla.suse.com/1192267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192379",
        "url": "https://bugzilla.suse.com/1192379"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192400",
        "url": "https://bugzilla.suse.com/1192400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192775",
        "url": "https://bugzilla.suse.com/1192775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192781",
        "url": "https://bugzilla.suse.com/1192781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192802",
        "url": "https://bugzilla.suse.com/1192802"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-3639 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-3639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-9517 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-9517/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3874 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3874/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3900 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3900/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12770 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-3702 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-3702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0941 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0941/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20320 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20320/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20322 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20322/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-31916 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-31916/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33033 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33033/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34556 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34556/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34981 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35477 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35477/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3653 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3655 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3656 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3679 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37159 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37159/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3732 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3744 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3752 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3753 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3760 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3764 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3764/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3772 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3772/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40490 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-41864 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-41864/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42008 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42252 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42252/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-12-07T14:31:45Z",
      "generator": {
        "date": "2021-12-07T14:31:45Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:3969-1",
      "initial_release_date": "2021-12-07T14:31:45Z",
      "revision_history": [
        {
          "date": "2021-12-07T14:31:45Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-150.78.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-150.78.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-default-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-default-livepatch-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-150.78.2.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-150.78.2.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-150.78.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-150.78.2.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-150.78.2.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-150.78.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.aarch64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-150.78.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
                  "product_id": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-150.78.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-150.78.1.noarch",
                  "product_id": "kernel-devel-4.12.14-150.78.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-150.78.2.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-150.78.2.noarch",
                  "product_id": "kernel-docs-4.12.14-150.78.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-150.78.2.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-150.78.2.noarch",
                  "product_id": "kernel-docs-html-4.12.14-150.78.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-150.78.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-150.78.1.noarch",
                  "product_id": "kernel-macros-4.12.14-150.78.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-150.78.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-150.78.1.noarch",
                  "product_id": "kernel-source-4.12.14-150.78.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-150.78.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-150.78.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-150.78.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-150.78.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-150.78.2.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-150.78.2.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-150.78.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-150.78.2.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-150.78.2.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-150.78.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.ppc64le",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-150.78.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
                  "product_id": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-150.78.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-150.78.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-150.78.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-default-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-default-livepatch-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-150.78.2.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-150.78.2.s390x",
                  "product_id": "kernel-obs-build-4.12.14-150.78.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-150.78.2.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-150.78.2.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-150.78.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-syms-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-150.78.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-150.78.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-150.78.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-150.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-150.78.1.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-150.78.1.s390x",
                  "product_id": "reiserfs-kmp-default-4.12.14-150.78.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-150.78.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-150.78.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-default-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-default-livepatch-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-150.78.2.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-150.78.2.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-150.78.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-150.78.2.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-150.78.2.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-150.78.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.x86_64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-150.78.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
                  "product_id": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15",
                  "product_id": "SUSE Linux Enterprise Live Patching 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-150.78.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-150.78.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-150.78.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-150.78.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-150.78.2.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-150.78.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-150.78.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-150.78.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.78.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.78.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-150.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-3639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-3639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-3639",
          "url": "https://www.suse.com/security/cve/CVE-2018-3639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074701 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1074701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085235 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1085235"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085308 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1085308"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087078 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1087078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1092631 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1092631"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1092885 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1092885"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1094912 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1094912"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098813 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1098813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1100394 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1100394"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1102640 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1102640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1105412 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1105412"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1111963 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1111963"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172781 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1172781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172782 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1172782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172783 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1172783"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173489 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1173489"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1201877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215674 for CVE-2018-3639",
          "url": "https://bugzilla.suse.com/1215674"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-3639"
    },
    {
      "cve": "CVE-2018-9517",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-9517"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-9517",
          "url": "https://www.suse.com/security/cve/CVE-2018-9517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1108488 for CVE-2018-9517",
          "url": "https://bugzilla.suse.com/1108488"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-9517"
    },
    {
      "cve": "CVE-2019-3874",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3874"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3874",
          "url": "https://www.suse.com/security/cve/CVE-2019-3874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129898 for CVE-2019-3874",
          "url": "https://bugzilla.suse.com/1129898"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3874"
    },
    {
      "cve": "CVE-2019-3900",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3900"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3900",
          "url": "https://www.suse.com/security/cve/CVE-2019-3900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133374 for CVE-2019-3900",
          "url": "https://bugzilla.suse.com/1133374"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3900"
    },
    {
      "cve": "CVE-2020-12770",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12770"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12770",
          "url": "https://www.suse.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171420 for CVE-2020-12770",
          "url": "https://bugzilla.suse.com/1171420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12770"
    },
    {
      "cve": "CVE-2020-3702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-3702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-3702",
          "url": "https://www.suse.com/security/cve/CVE-2020-3702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191193 for CVE-2020-3702",
          "url": "https://bugzilla.suse.com/1191193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191529 for CVE-2020-3702",
          "url": "https://bugzilla.suse.com/1191529"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-3702"
    },
    {
      "cve": "CVE-2021-0941",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0941"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0941",
          "url": "https://www.suse.com/security/cve/CVE-2021-0941"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192045 for CVE-2021-0941",
          "url": "https://bugzilla.suse.com/1192045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192048 for CVE-2021-0941",
          "url": "https://bugzilla.suse.com/1192048"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0941"
    },
    {
      "cve": "CVE-2021-20320",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20320"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20320",
          "url": "https://www.suse.com/security/cve/CVE-2021-20320"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190601 for CVE-2021-20320",
          "url": "https://bugzilla.suse.com/1190601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-20320"
    },
    {
      "cve": "CVE-2021-20322",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20322"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20322",
          "url": "https://www.suse.com/security/cve/CVE-2021-20322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191790 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1191790"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191813 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1191813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193290 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1193290"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-20322"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-31916",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-31916"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-31916",
          "url": "https://www.suse.com/security/cve/CVE-2021-31916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192781 for CVE-2021-31916",
          "url": "https://bugzilla.suse.com/1192781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-31916"
    },
    {
      "cve": "CVE-2021-33033",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33033"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33033",
          "url": "https://www.suse.com/security/cve/CVE-2021-33033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186109 for CVE-2021-33033",
          "url": "https://bugzilla.suse.com/1186109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186283 for CVE-2021-33033",
          "url": "https://bugzilla.suse.com/1186283"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-33033",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-34556",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34556"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34556",
          "url": "https://www.suse.com/security/cve/CVE-2021-34556"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188983 for CVE-2021-34556",
          "url": "https://bugzilla.suse.com/1188983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-34556"
    },
    {
      "cve": "CVE-2021-34981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34981",
          "url": "https://www.suse.com/security/cve/CVE-2021-34981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191961 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1191961"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192595 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1192595"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212298 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1212298"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-34981"
    },
    {
      "cve": "CVE-2021-35477",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35477"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35477",
          "url": "https://www.suse.com/security/cve/CVE-2021-35477"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188985 for CVE-2021-35477",
          "url": "https://bugzilla.suse.com/1188985"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-35477"
    },
    {
      "cve": "CVE-2021-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3640",
          "url": "https://www.suse.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188172 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188613 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191530 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1191530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3640"
    },
    {
      "cve": "CVE-2021-3653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3653",
          "url": "https://www.suse.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189399 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189399"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189420 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3655",
          "url": "https://www.suse.com/security/cve/CVE-2021-3655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188563 for CVE-2021-3655",
          "url": "https://bugzilla.suse.com/1188563"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3655"
    },
    {
      "cve": "CVE-2021-3656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3656",
          "url": "https://www.suse.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189400 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189418 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189418"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-3679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3679",
          "url": "https://www.suse.com/security/cve/CVE-2021-3679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189057 for CVE-2021-3679",
          "url": "https://bugzilla.suse.com/1189057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3679"
    },
    {
      "cve": "CVE-2021-37159",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37159"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37159",
          "url": "https://www.suse.com/security/cve/CVE-2021-37159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188601 for CVE-2021-37159",
          "url": "https://bugzilla.suse.com/1188601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37159"
    },
    {
      "cve": "CVE-2021-3732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3732",
          "url": "https://www.suse.com/security/cve/CVE-2021-3732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189706 for CVE-2021-3732",
          "url": "https://bugzilla.suse.com/1189706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3732"
    },
    {
      "cve": "CVE-2021-3744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3744",
          "url": "https://www.suse.com/security/cve/CVE-2021-3744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3744"
    },
    {
      "cve": "CVE-2021-3752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3752",
          "url": "https://www.suse.com/security/cve/CVE-2021-3752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190023 for CVE-2021-3752",
          "url": "https://bugzilla.suse.com/1190023"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190432 for CVE-2021-3752",
          "url": "https://bugzilla.suse.com/1190432"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3752"
    },
    {
      "cve": "CVE-2021-3753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3753",
          "url": "https://www.suse.com/security/cve/CVE-2021-3753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190025 for CVE-2021-3753",
          "url": "https://bugzilla.suse.com/1190025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3753"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    },
    {
      "cve": "CVE-2021-3760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3760",
          "url": "https://www.suse.com/security/cve/CVE-2021-3760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190067 for CVE-2021-3760",
          "url": "https://bugzilla.suse.com/1190067"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3760"
    },
    {
      "cve": "CVE-2021-3764",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3764"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3764",
          "url": "https://www.suse.com/security/cve/CVE-2021-3764"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3764",
          "url": "https://bugzilla.suse.com/1190534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194518 for CVE-2021-3764",
          "url": "https://bugzilla.suse.com/1194518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3764"
    },
    {
      "cve": "CVE-2021-3772",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3772"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3772",
          "url": "https://www.suse.com/security/cve/CVE-2021-3772"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190351 for CVE-2021-3772",
          "url": "https://bugzilla.suse.com/1190351"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3772"
    },
    {
      "cve": "CVE-2021-38160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38160",
          "url": "https://www.suse.com/security/cve/CVE-2021-38160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190117 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190118 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38160"
    },
    {
      "cve": "CVE-2021-38198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38198",
          "url": "https://www.suse.com/security/cve/CVE-2021-38198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189262 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189278 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-38198"
    },
    {
      "cve": "CVE-2021-38204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38204",
          "url": "https://www.suse.com/security/cve/CVE-2021-38204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189291 for CVE-2021-38204",
          "url": "https://bugzilla.suse.com/1189291"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38204"
    },
    {
      "cve": "CVE-2021-40490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40490",
          "url": "https://www.suse.com/security/cve/CVE-2021-40490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190159 for CVE-2021-40490",
          "url": "https://bugzilla.suse.com/1190159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192775 for CVE-2021-40490",
          "url": "https://bugzilla.suse.com/1192775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-40490"
    },
    {
      "cve": "CVE-2021-41864",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-41864"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-41864",
          "url": "https://www.suse.com/security/cve/CVE-2021-41864"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191317 for CVE-2021-41864",
          "url": "https://bugzilla.suse.com/1191317"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191318 for CVE-2021-41864",
          "url": "https://bugzilla.suse.com/1191318"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-41864"
    },
    {
      "cve": "CVE-2021-42008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42008",
          "url": "https://www.suse.com/security/cve/CVE-2021-42008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191315 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1191315"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191660 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1191660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42008"
    },
    {
      "cve": "CVE-2021-42252",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42252"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42252",
          "url": "https://www.suse.com/security/cve/CVE-2021-42252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190479 for CVE-2021-42252",
          "url": "https://bugzilla.suse.com/1190479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192444 for CVE-2021-42252",
          "url": "https://bugzilla.suse.com/1192444"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-07T14:31:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42252"
    }
  ]
}
  suse-su-2021:2746-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for the Linux Kernel 5.3.18-57 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2746,SUSE-SLE-Live-Patching-12-SP4-2021-2750,SUSE-SLE-Live-Patching-12-SP4-2021-2751,SUSE-SLE-Live-Patching-12-SP4-2021-2752,SUSE-SLE-Live-Patching-12-SP4-2021-2753,SUSE-SLE-Live-Patching-12-SP4-2021-2754,SUSE-SLE-Live-Patching-12-SP4-2021-2755,SUSE-SLE-Live-Patching-12-SP5-2021-2736,SUSE-SLE-Live-Patching-12-SP5-2021-2737,SUSE-SLE-Live-Patching-12-SP5-2021-2738,SUSE-SLE-Live-Patching-12-SP5-2021-2739,SUSE-SLE-Live-Patching-12-SP5-2021-2740,SUSE-SLE-Live-Patching-12-SP5-2021-2741,SUSE-SLE-Live-Patching-12-SP5-2021-2742,SUSE-SLE-Live-Patching-12-SP5-2021-2743,SUSE-SLE-Live-Patching-12-SP5-2021-2744,SUSE-SLE-Live-Patching-12-SP5-2021-2745,SUSE-SLE-Live-Patching-12-SP5-2021-2746,SUSE-SLE-Live-Patching-12-SP5-2021-2747,SUSE-SLE-Live-Patching-12-SP5-2021-2748,SUSE-SLE-Module-Live-Patching-15-2021-2727,SUSE-SLE-Module-Live-Patching-15-2021-2728,SUSE-SLE-Module-Live-Patching-15-2021-2731,SUSE-SLE-Module-Live-Patching-15-2021-2732,SUSE-SLE-Module-Live-Patching-15-2021-2734,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2709,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2711,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2713,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2714,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2717,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2719,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2721,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2724,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2725,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2729,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2730,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2733,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2696,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2697,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2701,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2702,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2705,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2707,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2708,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2710,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2712,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2715,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2716,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2718,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2720,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2722,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2723,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2698,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2699,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2700,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2703,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2704",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2746-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2746-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212746-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2746-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188323",
        "url": "https://bugzilla.suse.com/1188323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188842",
        "url": "https://bugzilla.suse.com/1188842"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3609 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
    "tracking": {
      "current_release_date": "2021-08-17T10:02:15Z",
      "generator": {
        "date": "2021-08-17T10:02:15Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2746-1",
      "initial_release_date": "2021-08-17T10:02:15Z",
      "revision_history": [
        {
          "date": "2021-08-17T10:02:15Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15",
                  "product_id": "SUSE Linux Enterprise Live Patching 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15",
                  "product_id": "SUSE Linux Enterprise Live Patching 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15",
                  "product_id": "SUSE Linux Enterprise Live Patching 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15",
                  "product_id": "SUSE Linux Enterprise Live Patching 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15",
                  "product_id": "SUSE Linux Enterprise Live Patching 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-17T10:02:15Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-3609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3609",
          "url": "https://www.suse.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187215 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1187215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188323 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188720 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1196810"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-17T10:02:15Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3609"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-16-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-15-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-6-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-14-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-12-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-4-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-10-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-5-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-5-3.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-3-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-13-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-11-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-9-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-8-2.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-5-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-17T10:02:15Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2021:2678-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).\n- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).\n- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).\n- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).\n- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).\n- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).\n- KVM: nVMX: Consult only the \u0027basic\u0027 exit reason when routing nested exit (bsc#1188773).\n- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).\n- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).\n- RDMA/cma: Protect RMW with qp_mutex (git-fixes).\n- Revert \u0027ACPI: resources: Add checks for ACPI IRQ override\u0027 (git-fixes).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- Revert \u0027be2net: disable bh with spin_lock in be_process_mcc\u0027 (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1184631).\n- bcache: remove bcache device self-defined readahead (bsc#1184631).\n- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: do not disable an already disabled PCI device (git-fixes).\n- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).\n- cadence: force nonlinear buffers to be cloned (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188748).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix IRQ free race during driver unload (git-fixes).\n- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Update scaling settings on modeset (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- e1000e: Check the PCIm state (git-fixes).\n- e1000e: Fix an error handling path in \u0027e1000_probe()\u0027 (git-fixes).\n- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).\n- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).\n- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).\n- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- i2c: core: Disable client irq on reboot/shutdown (git-fixes).\n- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).\n- i40e: Fix error handling in i40e_vsi_open (git-fixes).\n- iavf: Fix an error handling path in \u0027iavf_probe()\u0027 (git-fixes).\n- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).\n- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).\n- igb: Fix an error handling path in \u0027igb_probe()\u0027 (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igb: Fix use-after-free error during reset (git-fixes).\n- igc: Fix an error handling path in \u0027igc_probe()\u0027 (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- ixgbe: Fix an error handling path in \u0027ixgbe_probe()\u0027 (git-fixes).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).\n- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).\n- misc: alcor_pci: fix inverted branch condition (git-fixes).\n- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mt76: mt7603: set 0 as min coverage_class value (git-fixes).\n- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).\n- mt76: mt7615: increase MCU command timeout (git-fixes).\n- mt76: set dma-done flag for flushed descriptors (git-fixes).\n- mvpp2: suppress warning (git-fixes).\n- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).\n- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).\n- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).\n- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mvpp2: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).\n- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- powerpc/stacktrace: Fix spurious \u0027stale\u0027 traces in raise_backtrace_ipi() (bsc#1156395).\n- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).\n- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).\n- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).\n- pwm: imx1: Do not disable clocks at device remove time (git-fixes).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).\n- r8152: Fix potential PM refcount imbalance (bsc#1186194).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).\n- rbd: always kick acquire on \u0027acquired\u0027 and \u0027released\u0027 notifications (bsc#1188746).\n- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).\n- regulator: hi6421: Fix getting wrong drvdata (git-fixes).\n- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).\n- replaced with upstream security mitigation cleanup\n- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- sfp: Fix error handing in sfp_probe() (git-fixes).\n- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).\n- spi: cadence: Correct initialisation of runtime PM again (git-fixes).\n- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).\n- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).\n- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- xen/events: reset active flag for lateeoi events later (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2678,SUSE-SLE-Module-RT-15-SP2-2021-2678,SUSE-SUSE-MicroOS-5.0-2021-2678",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2678-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2678-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212678-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2678-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153274",
        "url": "https://bugzilla.suse.com/1153274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179243",
        "url": "https://bugzilla.suse.com/1179243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184631",
        "url": "https://bugzilla.suse.com/1184631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186194",
        "url": "https://bugzilla.suse.com/1186194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188062",
        "url": "https://bugzilla.suse.com/1188062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188063",
        "url": "https://bugzilla.suse.com/1188063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188257",
        "url": "https://bugzilla.suse.com/1188257"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188445",
        "url": "https://bugzilla.suse.com/1188445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188504",
        "url": "https://bugzilla.suse.com/1188504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188683",
        "url": "https://bugzilla.suse.com/1188683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188746",
        "url": "https://bugzilla.suse.com/1188746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188747",
        "url": "https://bugzilla.suse.com/1188747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188748",
        "url": "https://bugzilla.suse.com/1188748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188770",
        "url": "https://bugzilla.suse.com/1188770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188771",
        "url": "https://bugzilla.suse.com/1188771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188772",
        "url": "https://bugzilla.suse.com/1188772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188773",
        "url": "https://bugzilla.suse.com/1188773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188774",
        "url": "https://bugzilla.suse.com/1188774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188777",
        "url": "https://bugzilla.suse.com/1188777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188842",
        "url": "https://bugzilla.suse.com/1188842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-21781 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-21781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33909 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33909/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-12T12:23:31Z",
      "generator": {
        "date": "2021-08-12T12:23:31Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2678-1",
      "initial_release_date": "2021-08-12T12:23:31Z",
      "revision_history": [
        {
          "date": "2021-08-12T12:23:31Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.3.18-48.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.3.18-48.1.noarch",
                  "product_id": "kernel-devel-rt-5.3.18-48.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.3.18-48.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.3.18-48.1.noarch",
                  "product_id": "kernel-source-rt-5.3.18-48.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.3.18-48.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.3.18-48.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt_debug-5.3.18-48.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt_debug-5.3.18-48.1.x86_64",
                  "product_id": "cluster-md-kmp-rt_debug-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.3.18-48.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.3.18-48.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt_debug-5.3.18-48.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt_debug-5.3.18-48.1.x86_64",
                  "product_id": "dlm-kmp-rt_debug-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.3.18-48.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.3.18-48.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt_debug-5.3.18-48.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt_debug-5.3.18-48.1.x86_64",
                  "product_id": "gfs2-kmp-rt_debug-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.3.18-48.1.x86_64",
                  "product_id": "kernel-rt-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.3.18-48.1.x86_64",
                  "product_id": "kernel-rt-devel-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.3.18-48.1.x86_64",
                  "product_id": "kernel-rt-extra-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.3.18-48.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.3.18-48.1.x86_64",
                  "product_id": "kernel-rt_debug-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.3.18-48.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-extra-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-extra-5.3.18-48.1.x86_64",
                  "product_id": "kernel-rt_debug-extra-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-5.3.18-48.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-5.3.18-48.1.x86_64",
                  "product_id": "kernel-syms-rt-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.3.18-48.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt_debug-5.3.18-48.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt_debug-5.3.18-48.1.x86_64",
                  "product_id": "kselftests-kmp-rt_debug-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.3.18-48.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.3.18-48.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_debug-5.3.18-48.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_debug-5.3.18-48.1.x86_64",
                  "product_id": "ocfs2-kmp-rt_debug-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.3.18-48.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.3.18-48.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.3.18-48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt_debug-5.3.18-48.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt_debug-5.3.18-48.1.x86_64",
                  "product_id": "reiserfs-kmp-rt_debug-5.3.18-48.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Real Time Module 15 SP2",
                "product": {
                  "name": "SUSE Real Time Module 15 SP2",
                  "product_id": "SUSE Real Time Module 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-rt:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.0",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.0",
                  "product_id": "SUSE Linux Enterprise Micro 5.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-5.3.18-48.1.noarch as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch"
        },
        "product_reference": "kernel-devel-rt-5.3.18-48.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.3.18-48.1.noarch as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.3.18-48.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
          "product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-48.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-21781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-21781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process\u0027s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-21781",
          "url": "https://www.suse.com/security/cve/CVE-2021-21781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188445 for CVE-2021-21781",
          "url": "https://bugzilla.suse.com/1188445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-12T12:23:31Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-21781"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-12T12:23:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-33909",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33909"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33909",
          "url": "https://www.suse.com/security/cve/CVE-2021-33909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188062 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188063 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188063"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188257 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189302 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1189302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190859 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1190859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-12T12:23:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-12T12:23:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
          "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
          "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
            "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
            "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-12T12:23:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2021:2756-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).\n- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).\n- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).\n- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).\n- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).\n- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).\n- KVM: nVMX: Consult only the \u0027basic\u0027 exit reason when routing nested exit (bsc#1188773).\n- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).\n- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).\n- RDMA/cma: Protect RMW with qp_mutex (git-fixes).\n- Revert \u0027ACPI: resources: Add checks for ACPI IRQ override\u0027 (git-fixes).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- Revert \u0027be2net: disable bh with spin_lock in be_process_mcc\u0027 (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1184631).\n- bcache: remove bcache device self-defined readahead (bsc#1184631).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: do not disable an already disabled PCI device (git-fixes).\n- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- cadence: force nonlinear buffers to be cloned (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188748).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix IRQ free race during driver unload (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Update scaling settings on modeset (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- e1000e: Check the PCIm state (git-fixes).\n- e1000e: Fix an error handling path in \u0027e1000_probe()\u0027 (git-fixes).\n- fbmem: Do not delete the mode that is still in use (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).\n- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).\n- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).\n- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- i2c: core: Disable client irq on reboot/shutdown (git-fixes).\n- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).\n- i40e: Fix error handling in i40e_vsi_open (git-fixes).\n- iavf: Fix an error handling path in \u0027iavf_probe()\u0027 (git-fixes).\n- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).\n- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).\n- igb: Fix an error handling path in \u0027igb_probe()\u0027 (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igb: Fix use-after-free error during reset (git-fixes).\n- igc: Fix an error handling path in \u0027igc_probe()\u0027 (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- ixgbe: Fix an error handling path in \u0027ixgbe_probe()\u0027 (git-fixes).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).\n- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).\n- misc: alcor_pci: fix inverted branch condition (git-fixes).\n- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mt76: mt7603: set 0 as min coverage_class value (git-fixes).\n- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).\n- mt76: mt7615: increase MCU command timeout (git-fixes).\n- mt76: set dma-done flag for flushed descriptors (git-fixes).\n- mvpp2: suppress warning (git-fixes).\n- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).\n- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).\n- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).\n- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mvpp2: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).\n- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- powerpc/stacktrace: Fix spurious \u0027stale\u0027 traces in raise_backtrace_ipi() (bsc#1156395).\n- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).\n- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).\n- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).\n- pwm: imx1: Do not disable clocks at device remove time (git-fixes).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).\n- r8152: Fix potential PM refcount imbalance (bsc#1186194).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).\n- rbd: always kick acquire on \u0027acquired\u0027 and \u0027released\u0027 notifications (bsc#1188746).\n- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).\n- regulator: hi6421: Fix getting wrong drvdata (git-fixes).\n- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).\n- replaced with upstream security mitigation cleanup\n- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- sfp: Fix error handing in sfp_probe() (git-fixes).\n- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).\n- spi: cadence: Correct initialisation of runtime PM again (git-fixes).\n- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).\n- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).\n- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- xen/events: reset active flag for lateeoi events later (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2756,SUSE-SLE-Module-Basesystem-15-SP2-2021-2756,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2756,SUSE-SLE-Module-Legacy-15-SP2-2021-2756,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2756,SUSE-SLE-Product-HA-15-SP2-2021-2756,SUSE-SLE-Product-WE-15-SP2-2021-2756,SUSE-SUSE-MicroOS-5.0-2021-2756",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2756-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2756-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212756-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2756-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153274",
        "url": "https://bugzilla.suse.com/1153274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155518",
        "url": "https://bugzilla.suse.com/1155518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179243",
        "url": "https://bugzilla.suse.com/1179243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180092",
        "url": "https://bugzilla.suse.com/1180092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184631",
        "url": "https://bugzilla.suse.com/1184631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186194",
        "url": "https://bugzilla.suse.com/1186194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186206",
        "url": "https://bugzilla.suse.com/1186206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188445",
        "url": "https://bugzilla.suse.com/1188445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188504",
        "url": "https://bugzilla.suse.com/1188504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188683",
        "url": "https://bugzilla.suse.com/1188683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188746",
        "url": "https://bugzilla.suse.com/1188746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188747",
        "url": "https://bugzilla.suse.com/1188747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188748",
        "url": "https://bugzilla.suse.com/1188748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188770",
        "url": "https://bugzilla.suse.com/1188770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188771",
        "url": "https://bugzilla.suse.com/1188771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188772",
        "url": "https://bugzilla.suse.com/1188772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188773",
        "url": "https://bugzilla.suse.com/1188773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188774",
        "url": "https://bugzilla.suse.com/1188774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188777",
        "url": "https://bugzilla.suse.com/1188777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-21781 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-21781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-17T11:25:27Z",
      "generator": {
        "date": "2021-08-17T11:25:27Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2756-1",
      "initial_release_date": "2021-08-17T11:25:27Z",
      "revision_history": [
        {
          "date": "2021-08-17T11:25:27Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
                  "product_id": "cluster-md-kmp-default-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-preempt-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-preempt-5.3.18-24.78.1.aarch64",
                  "product_id": "cluster-md-kmp-preempt-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-24.78.1.aarch64",
                  "product_id": "dlm-kmp-default-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-preempt-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "dlm-kmp-preempt-5.3.18-24.78.1.aarch64",
                  "product_id": "dlm-kmp-preempt-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-24.78.1.aarch64",
                  "product_id": "gfs2-kmp-default-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-preempt-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-preempt-5.3.18-24.78.1.aarch64",
                  "product_id": "gfs2-kmp-preempt-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-default-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-default-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
                "product": {
                  "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
                  "product_id": "kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.aarch64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.aarch64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-default-devel-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-default-extra-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-default-livepatch-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-obs-build-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-obs-qa-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-preempt-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-preempt-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-preempt-devel-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-extra-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-preempt-extra-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-preempt-extra-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-livepatch-devel-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-preempt-livepatch-devel-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kernel-syms-5.3.18-24.78.1.aarch64",
                  "product_id": "kernel-syms-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-24.78.1.aarch64",
                  "product_id": "kselftests-kmp-default-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-preempt-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-preempt-5.3.18-24.78.1.aarch64",
                  "product_id": "kselftests-kmp-preempt-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
                  "product_id": "ocfs2-kmp-default-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-preempt-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-preempt-5.3.18-24.78.1.aarch64",
                  "product_id": "ocfs2-kmp-preempt-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
                  "product_id": "reiserfs-kmp-default-5.3.18-24.78.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-preempt-5.3.18-24.78.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-preempt-5.3.18-24.78.1.aarch64",
                  "product_id": "reiserfs-kmp-preempt-5.3.18-24.78.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.3.18-24.78.1.noarch",
                "product": {
                  "name": "kernel-devel-5.3.18-24.78.1.noarch",
                  "product_id": "kernel-devel-5.3.18-24.78.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-5.3.18-24.78.1.noarch",
                "product": {
                  "name": "kernel-docs-5.3.18-24.78.1.noarch",
                  "product_id": "kernel-docs-5.3.18-24.78.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-5.3.18-24.78.1.noarch",
                "product": {
                  "name": "kernel-docs-html-5.3.18-24.78.1.noarch",
                  "product_id": "kernel-docs-html-5.3.18-24.78.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.3.18-24.78.1.noarch",
                "product": {
                  "name": "kernel-macros-5.3.18-24.78.1.noarch",
                  "product_id": "kernel-macros-5.3.18-24.78.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.3.18-24.78.1.noarch",
                "product": {
                  "name": "kernel-source-5.3.18-24.78.1.noarch",
                  "product_id": "kernel-source-5.3.18-24.78.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.3.18-24.78.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-5.3.18-24.78.1.noarch",
                  "product_id": "kernel-source-vanilla-5.3.18-24.78.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-24.78.1.ppc64le",
                  "product_id": "dlm-kmp-default-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
                  "product_id": "gfs2-kmp-default-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-debug-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-debug-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-debug-devel-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-default-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
                  "product_id": "kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.ppc64le",
                  "product_id": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-default-devel-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-default-extra-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-default-livepatch-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-kvmsmall-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-obs-build-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-obs-qa-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kernel-syms-5.3.18-24.78.1.ppc64le",
                  "product_id": "kernel-syms-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-24.78.1.ppc64le",
                  "product_id": "kselftests-kmp-default-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-5.3.18-24.78.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
                  "product_id": "reiserfs-kmp-default-5.3.18-24.78.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-24.78.1.s390x",
                  "product_id": "cluster-md-kmp-default-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-24.78.1.s390x",
                  "product_id": "dlm-kmp-default-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-24.78.1.s390x",
                  "product_id": "gfs2-kmp-default-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kernel-default-5.3.18-24.78.1.s390x",
                  "product_id": "kernel-default-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
                "product": {
                  "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
                  "product_id": "kernel-default-base-5.3.18-24.78.1.9.36.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.s390x",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.s390x",
                  "product_id": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kernel-default-devel-5.3.18-24.78.1.s390x",
                  "product_id": "kernel-default-devel-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kernel-default-extra-5.3.18-24.78.1.s390x",
                  "product_id": "kernel-default-extra-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-24.78.1.s390x",
                  "product_id": "kernel-default-livepatch-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kernel-obs-build-5.3.18-24.78.1.s390x",
                  "product_id": "kernel-obs-build-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-24.78.1.s390x",
                  "product_id": "kernel-obs-qa-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kernel-syms-5.3.18-24.78.1.s390x",
                  "product_id": "kernel-syms-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-5.3.18-24.78.1.s390x",
                  "product_id": "kernel-zfcpdump-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-24.78.1.s390x",
                  "product_id": "kselftests-kmp-default-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-24.78.1.s390x",
                  "product_id": "ocfs2-kmp-default-5.3.18-24.78.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-24.78.1.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-24.78.1.s390x",
                  "product_id": "reiserfs-kmp-default-5.3.18-24.78.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
                  "product_id": "cluster-md-kmp-default-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-preempt-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-preempt-5.3.18-24.78.1.x86_64",
                  "product_id": "cluster-md-kmp-preempt-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-24.78.1.x86_64",
                  "product_id": "dlm-kmp-default-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-preempt-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "dlm-kmp-preempt-5.3.18-24.78.1.x86_64",
                  "product_id": "dlm-kmp-preempt-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-24.78.1.x86_64",
                  "product_id": "gfs2-kmp-default-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-preempt-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-preempt-5.3.18-24.78.1.x86_64",
                  "product_id": "gfs2-kmp-preempt-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-debug-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-debug-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-debug-devel-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-default-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-default-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
                "product": {
                  "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
                  "product_id": "kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.x86_64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.x86_64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-24.78.1.9.36.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-default-devel-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-default-extra-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-default-livepatch-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-kvmsmall-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_78-preempt-1-5.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_78-preempt-1-5.3.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_78-preempt-1-5.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-obs-build-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-obs-qa-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-preempt-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-preempt-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-preempt-devel-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-extra-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-preempt-extra-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-preempt-extra-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-livepatch-devel-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-preempt-livepatch-devel-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kernel-syms-5.3.18-24.78.1.x86_64",
                  "product_id": "kernel-syms-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-24.78.1.x86_64",
                  "product_id": "kselftests-kmp-default-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-preempt-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-preempt-5.3.18-24.78.1.x86_64",
                  "product_id": "kselftests-kmp-preempt-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
                  "product_id": "ocfs2-kmp-default-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-preempt-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-preempt-5.3.18-24.78.1.x86_64",
                  "product_id": "ocfs2-kmp-preempt-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
                  "product_id": "reiserfs-kmp-default-5.3.18-24.78.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-preempt-5.3.18-24.78.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-preempt-5.3.18-24.78.1.x86_64",
                  "product_id": "reiserfs-kmp-preempt-5.3.18-24.78.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
                  "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-legacy:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.0",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.0",
                  "product_id": "SUSE Linux Enterprise Micro 5.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "kernel-default-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "kernel-default-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x"
        },
        "product_reference": "kernel-default-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64"
        },
        "product_reference": "kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le"
        },
        "product_reference": "kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x"
        },
        "product_reference": "kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "kernel-default-devel-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x"
        },
        "product_reference": "kernel-default-devel-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-24.78.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-24.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-24.78.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-24.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "kernel-preempt-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-24.78.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-24.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "kernel-obs-build-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x"
        },
        "product_reference": "kernel-obs-build-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-24.78.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-24.78.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "kernel-syms-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x"
        },
        "product_reference": "kernel-syms-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x"
        },
        "product_reference": "dlm-kmp-default-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-24.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-24.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-24.78.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-default-extra-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-extra-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-preempt-extra-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-24.78.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64"
        },
        "product_reference": "kernel-default-5.3.18-24.78.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-24.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-24.78.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64"
        },
        "product_reference": "kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-21781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-21781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process\u0027s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-21781",
          "url": "https://www.suse.com/security/cve/CVE-2021-21781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188445 for CVE-2021-21781",
          "url": "https://bugzilla.suse.com/1188445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-17T11:25:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-21781"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-17T11:25:27Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-17T11:25:27Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_78-default-1-5.3.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.78.1.9.36.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.78.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.78.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.78.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-17T11:25:27Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2021:2646-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).\n- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).\n- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).\n- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).\n- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).\n- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).\n- KVM: nVMX: Consult only the \u0027basic\u0027 exit reason when routing nested exit (bsc#1188773).\n- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).\n- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).\n- RDMA/cma: Protect RMW with qp_mutex (git-fixes).\n- Revert \u0027ACPI: resources: Add checks for ACPI IRQ override\u0027 (git-fixes).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- Revert \u0027be2net: disable bh with spin_lock in be_process_mcc\u0027 (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1184631).\n- bcache: remove bcache device self-defined readahead (bsc#1184631).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: do not disable an already disabled PCI device (git-fixes).\n- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- cadence: force nonlinear buffers to be cloned (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188748).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).\n- cifs: constify get_normalized_path() properly (bsc#1185902).\n- cifs: do not cargo-cult strndup() (bsc#1185902).\n- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).\n- cifs: do not send tree disconnect to ipc shares (bsc#1185902).\n- cifs: do not share tcp servers with dfs mounts (bsc#1185902).\n- cifs: do not share tcp sessions of dfs connections (bsc#1185902).\n- cifs: fix check of dfs interlinks (bsc#1185902).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- cifs: fix path comparison and hash calc (bsc#1185902).\n- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).\n- cifs: handle different charsets in dfs cache (bsc#1185902).\n- cifs: keep referral server sessions alive (bsc#1185902).\n- cifs: missing null pointer check in cifs_mount (bsc#1185902).\n- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).\n- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix IRQ free race during driver unload (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Update scaling settings on modeset (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- e1000e: Check the PCIm state (git-fixes).\n- e1000e: Fix an error handling path in \u0027e1000_probe()\u0027 (git-fixes).\n- fbmem: Do not delete the mode that is still in use (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).\n- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).\n- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).\n- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- i2c: core: Disable client irq on reboot/shutdown (git-fixes).\n- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).\n- i40e: Fix error handling in i40e_vsi_open (git-fixes).\n- iavf: Fix an error handling path in \u0027iavf_probe()\u0027 (git-fixes).\n- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).\n- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).\n- igb: Fix an error handling path in \u0027igb_probe()\u0027 (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igb: Fix use-after-free error during reset (git-fixes).\n- igc: Fix an error handling path in \u0027igc_probe()\u0027 (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- ixgbe: Fix an error handling path in \u0027ixgbe_probe()\u0027 (git-fixes).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).\n- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).\n- misc: alcor_pci: fix inverted branch condition (git-fixes).\n- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mt76: mt7603: set 0 as min coverage_class value (git-fixes).\n- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).\n- mt76: mt7615: increase MCU command timeout (git-fixes).\n- mt76: set dma-done flag for flushed descriptors (git-fixes).\n- mvpp2: suppress warning (git-fixes).\n- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).\n- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).\n- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).\n- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mvpp2: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).\n- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- powerpc/stacktrace: Fix spurious \u0027stale\u0027 traces in raise_backtrace_ipi() (bsc#1156395).\n- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).\n- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).\n- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).\n- pwm: imx1: Do not disable clocks at device remove time (git-fixes).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).\n- r8152: Fix potential PM refcount imbalance (bsc#1186194).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).\n- rbd: always kick acquire on \u0027acquired\u0027 and \u0027released\u0027 notifications (bsc#1188746).\n- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).\n- regulator: hi6421: Fix getting wrong drvdata (git-fixes).\n- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).\n- replaced with upstream security mitigation cleanup\n- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- sfp: Fix error handing in sfp_probe() (git-fixes).\n- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).\n- spi: cadence: Correct initialisation of runtime PM again (git-fixes).\n- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).\n- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).\n- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- xen/events: reset active flag for lateeoi events later (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2646,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2646",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2646-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2646-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212646-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2646-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153274",
        "url": "https://bugzilla.suse.com/1153274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155518",
        "url": "https://bugzilla.suse.com/1155518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179243",
        "url": "https://bugzilla.suse.com/1179243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180092",
        "url": "https://bugzilla.suse.com/1180092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184631",
        "url": "https://bugzilla.suse.com/1184631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185902",
        "url": "https://bugzilla.suse.com/1185902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186194",
        "url": "https://bugzilla.suse.com/1186194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186206",
        "url": "https://bugzilla.suse.com/1186206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188445",
        "url": "https://bugzilla.suse.com/1188445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188504",
        "url": "https://bugzilla.suse.com/1188504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188683",
        "url": "https://bugzilla.suse.com/1188683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188746",
        "url": "https://bugzilla.suse.com/1188746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188747",
        "url": "https://bugzilla.suse.com/1188747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188748",
        "url": "https://bugzilla.suse.com/1188748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188770",
        "url": "https://bugzilla.suse.com/1188770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188771",
        "url": "https://bugzilla.suse.com/1188771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188772",
        "url": "https://bugzilla.suse.com/1188772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188773",
        "url": "https://bugzilla.suse.com/1188773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188774",
        "url": "https://bugzilla.suse.com/1188774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188777",
        "url": "https://bugzilla.suse.com/1188777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-21781 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-21781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-10T08:03:37Z",
      "generator": {
        "date": "2021-08-10T08:03:37Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2646-1",
      "initial_release_date": "2021-08-10T08:03:37Z",
      "revision_history": [
        {
          "date": "2021-08-10T08:03:37Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.3.18-18.61.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.3.18-18.61.1.noarch",
                  "product_id": "kernel-devel-azure-5.3.18-18.61.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.3.18-18.61.1.noarch",
                "product": {
                  "name": "kernel-source-azure-5.3.18-18.61.1.noarch",
                  "product_id": "kernel-source-azure-5.3.18-18.61.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.3.18-18.61.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.3.18-18.61.1.x86_64",
                  "product_id": "dlm-kmp-azure-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.3.18-18.61.1.x86_64",
                  "product_id": "gfs2-kmp-azure-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "kernel-azure-5.3.18-18.61.1.x86_64",
                  "product_id": "kernel-azure-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.3.18-18.61.1.x86_64",
                  "product_id": "kernel-azure-devel-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.3.18-18.61.1.x86_64",
                  "product_id": "kernel-azure-extra-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.3.18-18.61.1.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.3.18-18.61.1.x86_64",
                  "product_id": "kernel-syms-azure-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.3.18-18.61.1.x86_64",
                  "product_id": "kselftests-kmp-azure-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.3.18-18.61.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.3.18-18.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.3.18-18.61.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.3.18-18.61.1.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.3.18-18.61.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.3.18-18.61.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64"
        },
        "product_reference": "kernel-azure-5.3.18-18.61.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.3.18-18.61.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.3.18-18.61.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.3.18-18.61.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.3.18-18.61.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.3.18-18.61.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.3.18-18.61.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.3.18-18.61.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.3.18-18.61.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-21781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-21781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process\u0027s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-21781",
          "url": "https://www.suse.com/security/cve/CVE-2021-21781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188445 for CVE-2021-21781",
          "url": "https://bugzilla.suse.com/1188445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-21781"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.61.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.61.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.61.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2021:2644-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. (bsc#1176724).\n- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bsc#1187038).\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- USB: move many drivers to use DEVICE_ATTR_WO (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).\n- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).\n- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188750).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-\u003eprepath (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- cosa: Add missing kfree in error path of cosa_write (git-fixes).\n- crypto: do not free algorithm before using (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- e100: handle eeprom as little endian (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add NULL pointer checks when freeing irqs (bsc#1176940).\n- gve: Add basic driver framework for Compute Engine Virtual NIC (jsc#SLE-10538).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add ethtool support (jsc#SLE-10538).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Add workqueue and reset support (jsc#SLE-10538).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: Copy and paste bug in gve_get_stats() (jsc#SLE-10538).\n- gve: Correct SKB queue index validation (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (bsc#1176940).\n- gve: Fix case where desc_cnt and data_cnt can get out of sync (jsc#SLE-10538).\n- gve: Fix error return code in gve_alloc_qpls() (jsc#SLE-10538).\n- gve: Fix the queue page list allocated pages count (bsc#1176940).\n- gve: Fix u64_stats_sync to initialize start (jsc#SLE-10538).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Fixes DMA synchronization (jsc#SLE-10538).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Remove the exporting of gve_probe (jsc#SLE-10538).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Update mgmt_msix_idx if num_ntfy changes (bsc#1176940).\n- gve: Upgrade memory barrier in poll routine (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: fix -ENOMEM null check on a page allocation (jsc#SLE-10538).\n- gve: fix dma sync bug where not all pages synced (bsc#1176940).\n- gve: fix unused variable/label warnings (jsc#SLE-10538).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- gve: replace kfree with kvfree (jsc#SLE-10538).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- kabi: fix nvme_wait_freeze_timeout() return type (bsc#1181161).\n- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.\n- kernel-binary.spec.in: build-id check requires elfutils.\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- kfifo: DECLARE_KIFO_PTR(fifo, u64) does not work on arm 32 bit (git-fixes).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).\n- net/mlx5: Query PPS pin operational status before registering it (git-fixes).\n- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).\n- net: Google gve: Remove dma_wmb() before ringing doorbell (bsc#1176940).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: broadcom CNIC: requires MMU (git-fixes).\n- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1181161).\n- nvme-multipath: fix double initialization of ANA state (bsc#1181161).\n- nvme-rdma: add clean action for failed reconnection (bsc#1181161).\n- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1181161).\n- nvme-rdma: use cancel tagset helper for tear down (bsc#1181161).\n- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1181161).\n- nvmet: use new ana_log_size instead the old one (bsc#1181161).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries/scm: Use a specific endian format for storing uuid from the device tree (bsc#1113295, git-fixes).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- replaced with above upstream fix.\n- replaced with upstream security mitigation cleanup\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (git-fixes).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: vudc synchronize sysfs code paths (git-fixes).\n- usbip: vudc: fix missing unlock on error in usbip_sockfd_store() (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- xen-pciback: reconfigure also from backend watch handler (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2644,SUSE-SLE-SERVER-12-SP5-2021-2644",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2644-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2644-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212644-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2644-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176724",
        "url": "https://bugzilla.suse.com/1176724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176931",
        "url": "https://bugzilla.suse.com/1176931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179195",
        "url": "https://bugzilla.suse.com/1179195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181161",
        "url": "https://bugzilla.suse.com/1181161"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186206",
        "url": "https://bugzilla.suse.com/1186206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186672",
        "url": "https://bugzilla.suse.com/1186672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187038",
        "url": "https://bugzilla.suse.com/1187038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187846",
        "url": "https://bugzilla.suse.com/1187846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188026",
        "url": "https://bugzilla.suse.com/1188026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188750",
        "url": "https://bugzilla.suse.com/1188750"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0429 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0429/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36386 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36386/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-10T08:03:19Z",
      "generator": {
        "date": "2021-08-10T08:03:19Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2644-1",
      "initial_release_date": "2021-08-10T08:03:19Z",
      "revision_history": [
        {
          "date": "2021-08-10T08:03:19Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-4.12.14-16.68.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-4.12.14-16.68.1.noarch",
                  "product_id": "kernel-devel-azure-4.12.14-16.68.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-4.12.14-16.68.1.noarch",
                "product": {
                  "name": "kernel-source-azure-4.12.14-16.68.1.noarch",
                  "product_id": "kernel-source-azure-4.12.14-16.68.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-4.12.14-16.68.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-4.12.14-16.68.1.x86_64",
                  "product_id": "dlm-kmp-azure-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-4.12.14-16.68.1.x86_64",
                  "product_id": "gfs2-kmp-azure-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "kernel-azure-4.12.14-16.68.1.x86_64",
                  "product_id": "kernel-azure-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-base-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "kernel-azure-base-4.12.14-16.68.1.x86_64",
                  "product_id": "kernel-azure-base-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-4.12.14-16.68.1.x86_64",
                  "product_id": "kernel-azure-devel-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-4.12.14-16.68.1.x86_64",
                  "product_id": "kernel-azure-extra-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-kgraft-devel-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "kernel-azure-kgraft-devel-4.12.14-16.68.1.x86_64",
                  "product_id": "kernel-azure-kgraft-devel-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-4.12.14-16.68.1.x86_64",
                  "product_id": "kernel-syms-azure-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-4.12.14-16.68.1.x86_64",
                  "product_id": "kselftests-kmp-azure-4.12.14-16.68.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-4.12.14-16.68.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-4.12.14-16.68.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-4.12.14-16.68.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-4.12.14-16.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64"
        },
        "product_reference": "kernel-azure-4.12.14-16.68.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-base-4.12.14-16.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64"
        },
        "product_reference": "kernel-azure-base-4.12.14-16.68.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-4.12.14-16.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-4.12.14-16.68.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-4.12.14-16.68.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch"
        },
        "product_reference": "kernel-devel-azure-4.12.14-16.68.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-4.12.14-16.68.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch"
        },
        "product_reference": "kernel-source-azure-4.12.14-16.68.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-4.12.14-16.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-4.12.14-16.68.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-4.12.14-16.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64"
        },
        "product_reference": "kernel-azure-4.12.14-16.68.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-base-4.12.14-16.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64"
        },
        "product_reference": "kernel-azure-base-4.12.14-16.68.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-4.12.14-16.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-4.12.14-16.68.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-4.12.14-16.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch"
        },
        "product_reference": "kernel-devel-azure-4.12.14-16.68.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-4.12.14-16.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch"
        },
        "product_reference": "kernel-source-azure-4.12.14-16.68.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-4.12.14-16.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-4.12.14-16.68.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-0429",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0429"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0429",
          "url": "https://www.suse.com/security/cve/CVE-2020-0429"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176724 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176931 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176931"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188026 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1188026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0429"
    },
    {
      "cve": "CVE-2020-36386",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36386"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36386",
          "url": "https://www.suse.com/security/cve/CVE-2020-36386"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187038 for CVE-2020-36386",
          "url": "https://bugzilla.suse.com/1187038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192868 for CVE-2020-36386",
          "url": "https://bugzilla.suse.com/1192868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-36386"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.68.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.68.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.68.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2021:3972-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails. (bsc#1191961)\n- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).\n- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).\n- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).\n- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).\n- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).\n- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).\n- CVE-2021-37159: Fixed use-after-free and a double free inside hso_free_net_device in drivers/net/usb/hso.c when unregister_netdev is called without checking for the NETREG_REGISTERED state (bnc#1188601).\n- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)\n- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel\u0027s bluetooth module. (bsc#1190023)\n- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)\n- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)\n- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)\n- CVE-2021-3772: Fixed a remote denial of service in the SCTP stack, if the attacker can spoof IP addresses and knows the IP-addresses and port numbers being used (bnc#1190351).\n- CVE-2018-9517: Fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).\n- CVE-2019-3874: Fixed possible denial of service attack via SCTP socket buffer used by a userspace applications (bnc#1129898).\n- CVE-2019-3900: Fixed an infinite loop issue while handling incoming packets in handle_rx() (bnc#1133374).\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).\n- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).\n- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).\n- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).\n- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. (bsc#1176724).\n\nThe following non-security bugs were fixed:\n\n- Add arch-dependent support markers in supported.conf (bsc#1186672)\n- Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)\n- NFS: Do uncached readdir when we\u0027re seeking a cookie in an empty page cache (bsc#1191628).\n- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).\n- Use /usr/lib/modules as module dir when usermerge is active in the target distro.\n- UsrMerge the kernel (boo#1184804)\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22913)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22913).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).\n- drm: fix spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- drop debugging statements\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- gigaset: fix spectre issue in do_data_b3_req (bsc#1192802).\n- handle also race conditions in /proc/net/tcp code\n- hisax: fix spectre issues (bsc#1192802).\n- hv: adjust mana_select_queue to old ndo_select_queue API\n- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185727).\n- hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185727).\n- hysdn: fix spectre issue in hycapi_send_message (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).\n- iwlwifi: fix spectre issue in iwl_dbgfs_update_pm (bsc#1192802).\n- media: dvb_ca_en50221: prevent using slot_info for Spectre attacs (bsc#1192802).\n- media: dvb_ca_en50221: sanity check slot number from userspace (bsc#1192802).\n- media: wl128x: get rid of a potential spectre issue (bsc#1192802).\n- memcg: enable accounting for file lock caches (bsc#1190115).\n- mm: vmscan: scan anonymous pages on file refaults (VM Performance, bsc#1183050).\n- mpt3sas: fix spectre issues (bsc#1192802).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854 bsc#1181855).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854 bsc#1181855).\n- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185727).\n- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185727).\n- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185727).\n- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185727).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191801).\n- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185727).\n- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185727).\n- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185727).\n- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185727).\n- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185727).\n- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185727).\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n- net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() (bsc#1192802).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- objtool: Do not fail on missing symbol table (bsc#1192379).\n- osst: fix spectre issue in osst_verify_frame (bsc#1192802).\n- ovl: check whiteout in ovl_create_over_whiteout() (bsc#1189846).\n- ovl: filter of trusted xattr results in audit (bsc#1189846).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1189846).\n- ovl: initialize error in ovl_copy_xattr (bsc#1189846).\n- ovl: relax WARN_ON() on rename to self (bsc#1189846).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).\n- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).\n- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).\n- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).\n- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).\n- s390/vtime: fix increased steal time accounting (bsc#1183861).\n- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).\n- scripts/git_sort/git_sort.py: add bpf git repo\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sysvipc/sem: mitigate semnum index against spectre v1 (bsc#1192802).\n- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-3972,SUSE-OpenStack-Cloud-9-2021-3972,SUSE-OpenStack-Cloud-Crowbar-9-2021-3972,SUSE-SLE-HA-12-SP4-2021-3972,SUSE-SLE-Live-Patching-12-SP4-2021-3972,SUSE-SLE-SAP-12-SP4-2021-3972,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3972",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3972-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:3972-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213972-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:3972-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087082",
        "url": "https://bugzilla.suse.com/1087082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1100416",
        "url": "https://bugzilla.suse.com/1100416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1108488",
        "url": "https://bugzilla.suse.com/1108488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129735",
        "url": "https://bugzilla.suse.com/1129735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129898",
        "url": "https://bugzilla.suse.com/1129898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133374",
        "url": "https://bugzilla.suse.com/1133374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153720",
        "url": "https://bugzilla.suse.com/1153720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171420",
        "url": "https://bugzilla.suse.com/1171420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176724",
        "url": "https://bugzilla.suse.com/1176724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176931",
        "url": "https://bugzilla.suse.com/1176931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180624",
        "url": "https://bugzilla.suse.com/1180624"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181854",
        "url": "https://bugzilla.suse.com/1181854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181855",
        "url": "https://bugzilla.suse.com/1181855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183050",
        "url": "https://bugzilla.suse.com/1183050"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183861",
        "url": "https://bugzilla.suse.com/1183861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184673",
        "url": "https://bugzilla.suse.com/1184673"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185677",
        "url": "https://bugzilla.suse.com/1185677"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185726",
        "url": "https://bugzilla.suse.com/1185726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185727",
        "url": "https://bugzilla.suse.com/1185727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185758",
        "url": "https://bugzilla.suse.com/1185758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185973",
        "url": "https://bugzilla.suse.com/1185973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186063",
        "url": "https://bugzilla.suse.com/1186063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186672",
        "url": "https://bugzilla.suse.com/1186672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188026",
        "url": "https://bugzilla.suse.com/1188026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188172",
        "url": "https://bugzilla.suse.com/1188172"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188563",
        "url": "https://bugzilla.suse.com/1188563"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188601",
        "url": "https://bugzilla.suse.com/1188601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188613",
        "url": "https://bugzilla.suse.com/1188613"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188842",
        "url": "https://bugzilla.suse.com/1188842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188983",
        "url": "https://bugzilla.suse.com/1188983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188985",
        "url": "https://bugzilla.suse.com/1188985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189057",
        "url": "https://bugzilla.suse.com/1189057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189262",
        "url": "https://bugzilla.suse.com/1189262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189278",
        "url": "https://bugzilla.suse.com/1189278"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189291",
        "url": "https://bugzilla.suse.com/1189291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189399",
        "url": "https://bugzilla.suse.com/1189399"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189400",
        "url": "https://bugzilla.suse.com/1189400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189418",
        "url": "https://bugzilla.suse.com/1189418"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189420",
        "url": "https://bugzilla.suse.com/1189420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189706",
        "url": "https://bugzilla.suse.com/1189706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189846",
        "url": "https://bugzilla.suse.com/1189846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189884",
        "url": "https://bugzilla.suse.com/1189884"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190023",
        "url": "https://bugzilla.suse.com/1190023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190025",
        "url": "https://bugzilla.suse.com/1190025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190067",
        "url": "https://bugzilla.suse.com/1190067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190115",
        "url": "https://bugzilla.suse.com/1190115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190117",
        "url": "https://bugzilla.suse.com/1190117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190118",
        "url": "https://bugzilla.suse.com/1190118"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190159",
        "url": "https://bugzilla.suse.com/1190159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190276",
        "url": "https://bugzilla.suse.com/1190276"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190349",
        "url": "https://bugzilla.suse.com/1190349"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190350",
        "url": "https://bugzilla.suse.com/1190350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190351",
        "url": "https://bugzilla.suse.com/1190351"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190432",
        "url": "https://bugzilla.suse.com/1190432"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190479",
        "url": "https://bugzilla.suse.com/1190479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190534",
        "url": "https://bugzilla.suse.com/1190534"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190601",
        "url": "https://bugzilla.suse.com/1190601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190717",
        "url": "https://bugzilla.suse.com/1190717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191193",
        "url": "https://bugzilla.suse.com/1191193"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191315",
        "url": "https://bugzilla.suse.com/1191315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191317",
        "url": "https://bugzilla.suse.com/1191317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191318",
        "url": "https://bugzilla.suse.com/1191318"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191529",
        "url": "https://bugzilla.suse.com/1191529"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191530",
        "url": "https://bugzilla.suse.com/1191530"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191628",
        "url": "https://bugzilla.suse.com/1191628"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191660",
        "url": "https://bugzilla.suse.com/1191660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191790",
        "url": "https://bugzilla.suse.com/1191790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191801",
        "url": "https://bugzilla.suse.com/1191801"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191813",
        "url": "https://bugzilla.suse.com/1191813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191961",
        "url": "https://bugzilla.suse.com/1191961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192036",
        "url": "https://bugzilla.suse.com/1192036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192045",
        "url": "https://bugzilla.suse.com/1192045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192048",
        "url": "https://bugzilla.suse.com/1192048"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192267",
        "url": "https://bugzilla.suse.com/1192267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192379",
        "url": "https://bugzilla.suse.com/1192379"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192400",
        "url": "https://bugzilla.suse.com/1192400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192444",
        "url": "https://bugzilla.suse.com/1192444"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192549",
        "url": "https://bugzilla.suse.com/1192549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192775",
        "url": "https://bugzilla.suse.com/1192775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192781",
        "url": "https://bugzilla.suse.com/1192781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192802",
        "url": "https://bugzilla.suse.com/1192802"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-13405 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-13405/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-9517 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-9517/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3874 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3874/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3900 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3900/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0429 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0429/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12770 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-3702 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-3702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0941 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0941/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20322 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20322/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-31916 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-31916/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34556 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34556/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34981 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3542 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3542/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35477 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35477/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3653 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3655 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3656 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3679 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3715 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3715/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37159 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37159/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3732 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3744 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3752 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3753 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3759 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3760 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3764 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3764/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3772 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3772/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40490 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-41864 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-41864/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42008 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42252 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42252/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42739 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42739/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-12-08T10:39:54Z",
      "generator": {
        "date": "2021-12-08T10:39:54Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:3972-1",
      "initial_release_date": "2021-12-08T10:39:54Z",
      "revision_history": [
        {
          "date": "2021-12-08T10:39:54Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-95.83.2.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-95.83.2.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-95.83.2.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-default-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-default-base-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-default-kgraft-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-95.83.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-95.83.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-95.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-95.83.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-95.83.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-95.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-syms-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.aarch64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-95.83.2.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-95.83.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-95.83.2.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-95.83.2.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-95.83.2.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-95.83.2.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-95.83.2.noarch",
                  "product_id": "kernel-devel-4.12.14-95.83.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-95.83.3.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-95.83.3.noarch",
                  "product_id": "kernel-docs-4.12.14-95.83.3.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-95.83.3.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-95.83.3.noarch",
                  "product_id": "kernel-docs-html-4.12.14-95.83.3.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-95.83.2.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-95.83.2.noarch",
                  "product_id": "kernel-macros-4.12.14-95.83.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-95.83.2.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-95.83.2.noarch",
                  "product_id": "kernel-source-4.12.14-95.83.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-95.83.2.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-95.83.2.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-95.83.2.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-95.83.2.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-debug-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-default-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-default-kgraft-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-95.83.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-95.83.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-95.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-95.83.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-95.83.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-95.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-syms-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.ppc64le",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-95.83.2.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-95.83.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-95.83.2.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-95.83.2.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-95.83.2.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-95.83.2.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-default-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-default-base-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-default-devel-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-default-extra-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-default-kgraft-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-default-man-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-95.83.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-95.83.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-95.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-95.83.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-95.83.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-95.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-syms-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-vanilla-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-95.83.2.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-95.83.2.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-95.83.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-95.83.2.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-95.83.2.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-95.83.2.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-95.83.2.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-95.83.2.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-debug-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-default-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-default-base-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-default-kgraft-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-95.83.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-95.83.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-95.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-95.83.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-95.83.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-95.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-syms-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.x86_64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-95.83.2.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-95.83.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-95.83.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 9",
                "product": {
                  "name": "SUSE OpenStack Cloud 9",
                  "product_id": "SUSE OpenStack Cloud 9",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud Crowbar 9",
                "product": {
                  "name": "SUSE OpenStack Cloud Crowbar 9",
                  "product_id": "SUSE OpenStack Cloud Crowbar 9",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.83.2.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.83.2.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.83.2.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-95.83.2.noarch as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-95.83.2.noarch as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-95.83.2.noarch as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.83.2.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.83.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.83.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.83.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-95.83.2.noarch as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-95.83.2.noarch as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-95.83.2.noarch as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.83.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-95.83.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-95.83.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-95.83.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.83.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-95.83.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x"
        },
        "product_reference": "kernel-default-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.83.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-95.83.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.83.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.83.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-95.83.2.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-95.83.2.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-95.83.2.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-95.83.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.83.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-95.83.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.83.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-95.83.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.83.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-95.83.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.83.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-95.83.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-13405",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-13405"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-13405",
          "url": "https://www.suse.com/security/cve/CVE-2018-13405"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1100416 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1100416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129735 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1129735"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195161 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1195161"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198702 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1198702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-13405"
    },
    {
      "cve": "CVE-2018-9517",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-9517"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-9517",
          "url": "https://www.suse.com/security/cve/CVE-2018-9517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1108488 for CVE-2018-9517",
          "url": "https://bugzilla.suse.com/1108488"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-9517"
    },
    {
      "cve": "CVE-2019-3874",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3874"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3874",
          "url": "https://www.suse.com/security/cve/CVE-2019-3874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129898 for CVE-2019-3874",
          "url": "https://bugzilla.suse.com/1129898"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3874"
    },
    {
      "cve": "CVE-2019-3900",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3900"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3900",
          "url": "https://www.suse.com/security/cve/CVE-2019-3900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133374 for CVE-2019-3900",
          "url": "https://bugzilla.suse.com/1133374"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3900"
    },
    {
      "cve": "CVE-2020-0429",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0429"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0429",
          "url": "https://www.suse.com/security/cve/CVE-2020-0429"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176724 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176931 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176931"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188026 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1188026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0429"
    },
    {
      "cve": "CVE-2020-12770",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12770"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12770",
          "url": "https://www.suse.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171420 for CVE-2020-12770",
          "url": "https://bugzilla.suse.com/1171420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12770"
    },
    {
      "cve": "CVE-2020-3702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-3702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-3702",
          "url": "https://www.suse.com/security/cve/CVE-2020-3702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191193 for CVE-2020-3702",
          "url": "https://bugzilla.suse.com/1191193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191529 for CVE-2020-3702",
          "url": "https://bugzilla.suse.com/1191529"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-3702"
    },
    {
      "cve": "CVE-2021-0941",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0941"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0941",
          "url": "https://www.suse.com/security/cve/CVE-2021-0941"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192045 for CVE-2021-0941",
          "url": "https://bugzilla.suse.com/1192045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192048 for CVE-2021-0941",
          "url": "https://bugzilla.suse.com/1192048"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0941"
    },
    {
      "cve": "CVE-2021-20322",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20322"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20322",
          "url": "https://www.suse.com/security/cve/CVE-2021-20322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191790 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1191790"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191813 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1191813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193290 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1193290"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-20322"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-31916",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-31916"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-31916",
          "url": "https://www.suse.com/security/cve/CVE-2021-31916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192781 for CVE-2021-31916",
          "url": "https://bugzilla.suse.com/1192781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-31916"
    },
    {
      "cve": "CVE-2021-34556",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34556"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34556",
          "url": "https://www.suse.com/security/cve/CVE-2021-34556"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188983 for CVE-2021-34556",
          "url": "https://bugzilla.suse.com/1188983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-34556"
    },
    {
      "cve": "CVE-2021-34981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34981",
          "url": "https://www.suse.com/security/cve/CVE-2021-34981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191961 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1191961"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192595 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1192595"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212298 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1212298"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-34981"
    },
    {
      "cve": "CVE-2021-3542",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3542"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3542",
          "url": "https://www.suse.com/security/cve/CVE-2021-3542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184673 for CVE-2021-3542",
          "url": "https://bugzilla.suse.com/1184673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186063 for CVE-2021-3542",
          "url": "https://bugzilla.suse.com/1186063"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3542"
    },
    {
      "cve": "CVE-2021-35477",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35477"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35477",
          "url": "https://www.suse.com/security/cve/CVE-2021-35477"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188985 for CVE-2021-35477",
          "url": "https://bugzilla.suse.com/1188985"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-35477"
    },
    {
      "cve": "CVE-2021-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3640",
          "url": "https://www.suse.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188172 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188613 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191530 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1191530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3640"
    },
    {
      "cve": "CVE-2021-3653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3653",
          "url": "https://www.suse.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189399 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189399"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189420 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3655",
          "url": "https://www.suse.com/security/cve/CVE-2021-3655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188563 for CVE-2021-3655",
          "url": "https://bugzilla.suse.com/1188563"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3655"
    },
    {
      "cve": "CVE-2021-3656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3656",
          "url": "https://www.suse.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189400 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189418 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189418"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-3679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3679",
          "url": "https://www.suse.com/security/cve/CVE-2021-3679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189057 for CVE-2021-3679",
          "url": "https://bugzilla.suse.com/1189057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3679"
    },
    {
      "cve": "CVE-2021-3715",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3715"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3715",
          "url": "https://www.suse.com/security/cve/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190349 for CVE-2021-3715",
          "url": "https://bugzilla.suse.com/1190349"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190350 for CVE-2021-3715",
          "url": "https://bugzilla.suse.com/1190350"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-3715",
          "url": "https://bugzilla.suse.com/1196722"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3715"
    },
    {
      "cve": "CVE-2021-37159",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37159"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37159",
          "url": "https://www.suse.com/security/cve/CVE-2021-37159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188601 for CVE-2021-37159",
          "url": "https://bugzilla.suse.com/1188601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37159"
    },
    {
      "cve": "CVE-2021-3732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3732",
          "url": "https://www.suse.com/security/cve/CVE-2021-3732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189706 for CVE-2021-3732",
          "url": "https://bugzilla.suse.com/1189706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3732"
    },
    {
      "cve": "CVE-2021-3744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3744",
          "url": "https://www.suse.com/security/cve/CVE-2021-3744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3744"
    },
    {
      "cve": "CVE-2021-3752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3752",
          "url": "https://www.suse.com/security/cve/CVE-2021-3752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190023 for CVE-2021-3752",
          "url": "https://bugzilla.suse.com/1190023"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190432 for CVE-2021-3752",
          "url": "https://bugzilla.suse.com/1190432"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3752"
    },
    {
      "cve": "CVE-2021-3753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3753",
          "url": "https://www.suse.com/security/cve/CVE-2021-3753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190025 for CVE-2021-3753",
          "url": "https://bugzilla.suse.com/1190025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3753"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    },
    {
      "cve": "CVE-2021-3759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3759",
          "url": "https://www.suse.com/security/cve/CVE-2021-3759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190115 for CVE-2021-3759",
          "url": "https://bugzilla.suse.com/1190115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3759"
    },
    {
      "cve": "CVE-2021-3760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3760",
          "url": "https://www.suse.com/security/cve/CVE-2021-3760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190067 for CVE-2021-3760",
          "url": "https://bugzilla.suse.com/1190067"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3760"
    },
    {
      "cve": "CVE-2021-3764",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3764"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3764",
          "url": "https://www.suse.com/security/cve/CVE-2021-3764"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3764",
          "url": "https://bugzilla.suse.com/1190534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194518 for CVE-2021-3764",
          "url": "https://bugzilla.suse.com/1194518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3764"
    },
    {
      "cve": "CVE-2021-3772",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3772"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3772",
          "url": "https://www.suse.com/security/cve/CVE-2021-3772"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190351 for CVE-2021-3772",
          "url": "https://bugzilla.suse.com/1190351"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3772"
    },
    {
      "cve": "CVE-2021-38160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38160",
          "url": "https://www.suse.com/security/cve/CVE-2021-38160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190117 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190118 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38160"
    },
    {
      "cve": "CVE-2021-38198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38198",
          "url": "https://www.suse.com/security/cve/CVE-2021-38198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189262 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189278 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-38198"
    },
    {
      "cve": "CVE-2021-38204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38204",
          "url": "https://www.suse.com/security/cve/CVE-2021-38204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189291 for CVE-2021-38204",
          "url": "https://bugzilla.suse.com/1189291"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38204"
    },
    {
      "cve": "CVE-2021-40490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40490",
          "url": "https://www.suse.com/security/cve/CVE-2021-40490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190159 for CVE-2021-40490",
          "url": "https://bugzilla.suse.com/1190159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192775 for CVE-2021-40490",
          "url": "https://bugzilla.suse.com/1192775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-40490"
    },
    {
      "cve": "CVE-2021-41864",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-41864"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-41864",
          "url": "https://www.suse.com/security/cve/CVE-2021-41864"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191317 for CVE-2021-41864",
          "url": "https://bugzilla.suse.com/1191317"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191318 for CVE-2021-41864",
          "url": "https://bugzilla.suse.com/1191318"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-41864"
    },
    {
      "cve": "CVE-2021-42008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42008",
          "url": "https://www.suse.com/security/cve/CVE-2021-42008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191315 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1191315"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191660 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1191660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42008"
    },
    {
      "cve": "CVE-2021-42252",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42252"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42252",
          "url": "https://www.suse.com/security/cve/CVE-2021-42252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190479 for CVE-2021-42252",
          "url": "https://bugzilla.suse.com/1190479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192444 for CVE-2021-42252",
          "url": "https://bugzilla.suse.com/1192444"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42252"
    },
    {
      "cve": "CVE-2021-42739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
          "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42739",
          "url": "https://www.suse.com/security/cve/CVE-2021-42739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184673 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1184673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192036 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1192036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.83.2.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.83.2.noarch",
            "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.83.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-08T10:39:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42739"
    }
  ]
}
  suse-su-2021:3876-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).\n- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).\n- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).\n- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).\n- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).\n- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).\n- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).\n- CVE-2021-42252: An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes (bnc#1190479).\n- CVE-2021-41864: prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).\n- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).\n- CVE-2021-3759: Unaccounted ipc objects could have lead to breaking memcg limits and DoS attacks (bsc#1190115).\n- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).\n- CVE-2021-3752: Fixed a use after free vulnerability in the bluetooth module. (bsc#1190023)\n- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)\n- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)\n- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)\n- CVE-2020-12770: An issue was discovered in the Linux kernel sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040 (bnc#1171420).\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2019-3900: An infinite loop issue was found in the vhost_net kernel module, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario (bnc#1133374).\n- CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. (bnc#1129898).\n- CVE-2018-9517: In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108488).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3653: A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \u0027int_ctl\u0027 field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399).\n- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-3679: A lack of CPU resource in the tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#0 bnc#1177666 bnc#1181158).\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).\n- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1190276).\n- CVE-2021-22543: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bnc#1186482 bnc#1190276).\n- CVE-2021-33909: fs/seq_file.c did not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05 (bnc#1188062 bnc#1188063).\n\nThe following non-security bugs were fixed:\n\n- Add arch-dependent support markers in supported.conf (bsc#1186672) \n- Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22913)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22913).\n- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1191888).\n- config: disable unprivileged BPF by default (jsc#SLE-22913)\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).\n- drm: fix spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- gigaset: fix spectre issue in do_data_b3_req (bsc#1192802).\n- hisax: fix spectre issues (bsc#1192802).\n- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).\n- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).\n- hysdn: fix spectre issue in hycapi_send_message (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).\n- iwlwifi: fix spectre issue in iwl_dbgfs_update_pm (bsc#1192802).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec.in: build-id check requires elfutils.\n- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.\n- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- media: dvb_ca_en50221: prevent using slot_info for Spectre attacs (bsc#1192802).\n- media: dvb_ca_en50221: sanity check slot number from userspace (bsc#1192802).\n- media: wl128x: get rid of a potential spectre issue (bsc#1192802).\n- memcg: enable accounting for file lock caches (bsc#1190115).\n- mm/memory.c: do_fault: avoid usage of stale vm_area_struct (bsc#1136513).\n- mpt3sas: fix spectre issues (bsc#1192802).\n- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).\n- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).\n- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).\n- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).\n- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n- net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() (bsc#1192802).\n- NFS: Do uncached readdir when we\u0027re seeking a cookie in an empty page cache (bsc#1191628).\n- objtool: Do not fail on missing symbol table (bsc#1192379).\n- osst: fix spectre issue in osst_verify_frame (bsc#1192802).\n- ovl: check whiteout in ovl_create_over_whiteout() (bsc#1189846).\n- ovl: filter of trusted xattr results in audit (bsc#1189846).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1189846).\n- ovl: initialize error in ovl_copy_xattr (bsc#1189846).\n- ovl: relax WARN_ON() on rename to self (bsc#1189846).\n- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).\n- Revert \u0027memcg: enable accounting for file lock caches (bsc#1190115).\u0027 This reverts commit 912b4421a3e9bb9f0ef1aadc64a436666259bd4d. It\u0027s effectively upstream commit 3754707bcc3e190e5dadc978d172b61e809cb3bd applied to kernel-source (to avoid proliferation of patches). Make a note in blacklist.conf too.\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).\n- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).\n- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).\n- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).\n- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scripts/git_sort/git_sort.py: Update nvme repositories\n- scsi: libfc: Fix array index out of bound exception (bsc#1188616).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1191349).\n- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349 bsc#1191457).\n- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1191349 bsc#1191457).\n- scsi: target: avoid using lun_tg_pt_gp after unlock (bsc#1186078).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sysvipc/sem: mitigate semnum index against spectre v1 (bsc#1192802).\n- target: core: Fix sense key for invalid XCOPY request (bsc#1186078).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- Use /usr/lib/modules as module dir when usermerge is active in the target distro.\n- UsrMerge the kernel (boo#1184804)\n- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-3876,SUSE-SLE-Module-Live-Patching-15-SP1-2021-3876,SUSE-SLE-Product-HA-15-SP1-2021-3876,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3876,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3876,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3876,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3876,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3876,SUSE-Storage-6-2021-3876",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3876-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:3876-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213876-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:3876-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1100416",
        "url": "https://bugzilla.suse.com/1100416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1108488",
        "url": "https://bugzilla.suse.com/1108488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129735",
        "url": "https://bugzilla.suse.com/1129735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129898",
        "url": "https://bugzilla.suse.com/1129898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133374",
        "url": "https://bugzilla.suse.com/1133374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136513",
        "url": "https://bugzilla.suse.com/1136513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171420",
        "url": "https://bugzilla.suse.com/1171420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176724",
        "url": "https://bugzilla.suse.com/1176724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177666",
        "url": "https://bugzilla.suse.com/1177666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181158",
        "url": "https://bugzilla.suse.com/1181158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184673",
        "url": "https://bugzilla.suse.com/1184673"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185726",
        "url": "https://bugzilla.suse.com/1185726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185758",
        "url": "https://bugzilla.suse.com/1185758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185973",
        "url": "https://bugzilla.suse.com/1185973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186078",
        "url": "https://bugzilla.suse.com/1186078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186109",
        "url": "https://bugzilla.suse.com/1186109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186390",
        "url": "https://bugzilla.suse.com/1186390"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186672",
        "url": "https://bugzilla.suse.com/1186672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188062",
        "url": "https://bugzilla.suse.com/1188062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188063",
        "url": "https://bugzilla.suse.com/1188063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188172",
        "url": "https://bugzilla.suse.com/1188172"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188563",
        "url": "https://bugzilla.suse.com/1188563"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188601",
        "url": "https://bugzilla.suse.com/1188601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188616",
        "url": "https://bugzilla.suse.com/1188616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188983",
        "url": "https://bugzilla.suse.com/1188983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188985",
        "url": "https://bugzilla.suse.com/1188985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189057",
        "url": "https://bugzilla.suse.com/1189057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189262",
        "url": "https://bugzilla.suse.com/1189262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189291",
        "url": "https://bugzilla.suse.com/1189291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189399",
        "url": "https://bugzilla.suse.com/1189399"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189400",
        "url": "https://bugzilla.suse.com/1189400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189706",
        "url": "https://bugzilla.suse.com/1189706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189846",
        "url": "https://bugzilla.suse.com/1189846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189884",
        "url": "https://bugzilla.suse.com/1189884"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190023",
        "url": "https://bugzilla.suse.com/1190023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190025",
        "url": "https://bugzilla.suse.com/1190025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190067",
        "url": "https://bugzilla.suse.com/1190067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190115",
        "url": "https://bugzilla.suse.com/1190115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190117",
        "url": "https://bugzilla.suse.com/1190117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190159",
        "url": "https://bugzilla.suse.com/1190159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190276",
        "url": "https://bugzilla.suse.com/1190276"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190349",
        "url": "https://bugzilla.suse.com/1190349"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190351",
        "url": "https://bugzilla.suse.com/1190351"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190479",
        "url": "https://bugzilla.suse.com/1190479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190534",
        "url": "https://bugzilla.suse.com/1190534"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190601",
        "url": "https://bugzilla.suse.com/1190601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190717",
        "url": "https://bugzilla.suse.com/1190717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191193",
        "url": "https://bugzilla.suse.com/1191193"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191315",
        "url": "https://bugzilla.suse.com/1191315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191317",
        "url": "https://bugzilla.suse.com/1191317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191349",
        "url": "https://bugzilla.suse.com/1191349"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191457",
        "url": "https://bugzilla.suse.com/1191457"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191628",
        "url": "https://bugzilla.suse.com/1191628"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191790",
        "url": "https://bugzilla.suse.com/1191790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191800",
        "url": "https://bugzilla.suse.com/1191800"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191888",
        "url": "https://bugzilla.suse.com/1191888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191961",
        "url": "https://bugzilla.suse.com/1191961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192045",
        "url": "https://bugzilla.suse.com/1192045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192267",
        "url": "https://bugzilla.suse.com/1192267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192379",
        "url": "https://bugzilla.suse.com/1192379"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192400",
        "url": "https://bugzilla.suse.com/1192400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192775",
        "url": "https://bugzilla.suse.com/1192775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192781",
        "url": "https://bugzilla.suse.com/1192781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192802",
        "url": "https://bugzilla.suse.com/1192802"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-13405 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-13405/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-9517 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-9517/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3874 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3874/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3900 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3900/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0429 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0429/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12770 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-3702 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-3702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-4788 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-4788/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0941 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0941/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20322 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20322/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-31916 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-31916/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33033 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33033/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33909 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33909/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34556 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34556/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34981 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3542 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3542/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35477 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35477/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3653 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3655 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3656 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3679 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3715 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3715/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37159 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37159/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3732 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3744 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3752 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3753 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3759 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3760 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3764 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3764/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3772 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3772/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40490 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-41864 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-41864/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42008 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42252 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42252/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-42739 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-42739/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-12-02T07:19:48Z",
      "generator": {
        "date": "2021-12-02T07:19:48Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:3876-1",
      "initial_release_date": "2021-12-02T07:19:48Z",
      "revision_history": [
        {
          "date": "2021-12-02T07:19:48Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.102.2.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.102.2.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-default-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-default-base-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-default-livepatch-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.102.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.102.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-197.102.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.102.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.102.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-197.102.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-syms-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.102.2.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-197.102.2.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-197.102.2.noarch",
                  "product_id": "kernel-devel-4.12.14-197.102.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-197.102.2.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-197.102.2.noarch",
                  "product_id": "kernel-docs-4.12.14-197.102.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-197.102.2.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-197.102.2.noarch",
                  "product_id": "kernel-docs-html-4.12.14-197.102.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-197.102.2.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-197.102.2.noarch",
                  "product_id": "kernel-macros-4.12.14-197.102.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-197.102.2.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-197.102.2.noarch",
                  "product_id": "kernel-source-4.12.14-197.102.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-197.102.2.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-197.102.2.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-197.102.2.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.102.2.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-debug-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-default-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.102.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.102.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-197.102.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.102.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.102.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-197.102.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-syms-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.102.2.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.102.2.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.102.2.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.102.2.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-default-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-default-base-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-default-devel-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-default-extra-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-default-livepatch-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-default-man-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.102.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.102.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-197.102.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.102.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.102.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-197.102.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-syms-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-vanilla-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.102.2.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.102.2.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.102.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.102.2.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.102.2.s390x",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.102.2.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.102.2.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.102.2.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-debug-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-default-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-default-base-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-default-livepatch-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.102.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.102.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-197.102.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.102.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.102.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-197.102.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-syms-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.102.2.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP1-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP1-BCL",
                  "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_bcl:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 6",
                "product": {
                  "name": "SUSE Enterprise Storage 6",
                  "product_id": "SUSE Enterprise Storage 6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch"
        },
        "product_reference": "kernel-source-4.12.14-197.102.2.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-13405",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-13405"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-13405",
          "url": "https://www.suse.com/security/cve/CVE-2018-13405"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1100416 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1100416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129735 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1129735"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195161 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1195161"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198702 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1198702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-13405"
    },
    {
      "cve": "CVE-2018-9517",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-9517"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-9517",
          "url": "https://www.suse.com/security/cve/CVE-2018-9517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1108488 for CVE-2018-9517",
          "url": "https://bugzilla.suse.com/1108488"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-9517"
    },
    {
      "cve": "CVE-2019-3874",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3874"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3874",
          "url": "https://www.suse.com/security/cve/CVE-2019-3874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129898 for CVE-2019-3874",
          "url": "https://bugzilla.suse.com/1129898"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3874"
    },
    {
      "cve": "CVE-2019-3900",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3900"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3900",
          "url": "https://www.suse.com/security/cve/CVE-2019-3900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133374 for CVE-2019-3900",
          "url": "https://bugzilla.suse.com/1133374"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3900"
    },
    {
      "cve": "CVE-2020-0429",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0429"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0429",
          "url": "https://www.suse.com/security/cve/CVE-2020-0429"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176724 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176931 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176931"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188026 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1188026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0429"
    },
    {
      "cve": "CVE-2020-12770",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12770"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12770",
          "url": "https://www.suse.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171420 for CVE-2020-12770",
          "url": "https://bugzilla.suse.com/1171420"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12770"
    },
    {
      "cve": "CVE-2020-3702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-3702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-3702",
          "url": "https://www.suse.com/security/cve/CVE-2020-3702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191193 for CVE-2020-3702",
          "url": "https://bugzilla.suse.com/1191193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191529 for CVE-2020-3702",
          "url": "https://bugzilla.suse.com/1191529"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-3702"
    },
    {
      "cve": "CVE-2020-4788",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-4788"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-4788",
          "url": "https://www.suse.com/security/cve/CVE-2020-4788"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177666 for CVE-2020-4788",
          "url": "https://bugzilla.suse.com/1177666"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1181158 for CVE-2020-4788",
          "url": "https://bugzilla.suse.com/1181158"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-4788"
    },
    {
      "cve": "CVE-2021-0941",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0941"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0941",
          "url": "https://www.suse.com/security/cve/CVE-2021-0941"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192045 for CVE-2021-0941",
          "url": "https://bugzilla.suse.com/1192045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192048 for CVE-2021-0941",
          "url": "https://bugzilla.suse.com/1192048"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0941"
    },
    {
      "cve": "CVE-2021-20322",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20322"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20322",
          "url": "https://www.suse.com/security/cve/CVE-2021-20322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191790 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1191790"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191813 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1191813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193290 for CVE-2021-20322",
          "url": "https://bugzilla.suse.com/1193290"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-20322"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-31916",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-31916"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-31916",
          "url": "https://www.suse.com/security/cve/CVE-2021-31916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192781 for CVE-2021-31916",
          "url": "https://bugzilla.suse.com/1192781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-31916"
    },
    {
      "cve": "CVE-2021-33033",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33033"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33033",
          "url": "https://www.suse.com/security/cve/CVE-2021-33033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186109 for CVE-2021-33033",
          "url": "https://bugzilla.suse.com/1186109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186283 for CVE-2021-33033",
          "url": "https://bugzilla.suse.com/1186283"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-33033",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33909",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33909"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33909",
          "url": "https://www.suse.com/security/cve/CVE-2021-33909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188062 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188063 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188063"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188257 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189302 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1189302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190859 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1190859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-34556",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34556"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34556",
          "url": "https://www.suse.com/security/cve/CVE-2021-34556"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188983 for CVE-2021-34556",
          "url": "https://bugzilla.suse.com/1188983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-34556"
    },
    {
      "cve": "CVE-2021-34981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34981",
          "url": "https://www.suse.com/security/cve/CVE-2021-34981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191961 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1191961"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192595 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1192595"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212298 for CVE-2021-34981",
          "url": "https://bugzilla.suse.com/1212298"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-34981"
    },
    {
      "cve": "CVE-2021-3542",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3542"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3542",
          "url": "https://www.suse.com/security/cve/CVE-2021-3542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184673 for CVE-2021-3542",
          "url": "https://bugzilla.suse.com/1184673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186063 for CVE-2021-3542",
          "url": "https://bugzilla.suse.com/1186063"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3542"
    },
    {
      "cve": "CVE-2021-35477",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35477"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35477",
          "url": "https://www.suse.com/security/cve/CVE-2021-35477"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188985 for CVE-2021-35477",
          "url": "https://bugzilla.suse.com/1188985"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-35477"
    },
    {
      "cve": "CVE-2021-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3640",
          "url": "https://www.suse.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188172 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188613 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191530 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1191530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3640"
    },
    {
      "cve": "CVE-2021-3653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3653",
          "url": "https://www.suse.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189399 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189399"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189420 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3655",
          "url": "https://www.suse.com/security/cve/CVE-2021-3655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188563 for CVE-2021-3655",
          "url": "https://bugzilla.suse.com/1188563"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3655"
    },
    {
      "cve": "CVE-2021-3656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3656",
          "url": "https://www.suse.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189400 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189418 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189418"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-3679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3679",
          "url": "https://www.suse.com/security/cve/CVE-2021-3679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189057 for CVE-2021-3679",
          "url": "https://bugzilla.suse.com/1189057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3679"
    },
    {
      "cve": "CVE-2021-3715",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3715"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3715",
          "url": "https://www.suse.com/security/cve/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190349 for CVE-2021-3715",
          "url": "https://bugzilla.suse.com/1190349"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190350 for CVE-2021-3715",
          "url": "https://bugzilla.suse.com/1190350"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-3715",
          "url": "https://bugzilla.suse.com/1196722"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3715"
    },
    {
      "cve": "CVE-2021-37159",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37159"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37159",
          "url": "https://www.suse.com/security/cve/CVE-2021-37159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188601 for CVE-2021-37159",
          "url": "https://bugzilla.suse.com/1188601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37159"
    },
    {
      "cve": "CVE-2021-3732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3732",
          "url": "https://www.suse.com/security/cve/CVE-2021-3732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189706 for CVE-2021-3732",
          "url": "https://bugzilla.suse.com/1189706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3732"
    },
    {
      "cve": "CVE-2021-3744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3744",
          "url": "https://www.suse.com/security/cve/CVE-2021-3744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3744"
    },
    {
      "cve": "CVE-2021-3752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3752",
          "url": "https://www.suse.com/security/cve/CVE-2021-3752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190023 for CVE-2021-3752",
          "url": "https://bugzilla.suse.com/1190023"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190432 for CVE-2021-3752",
          "url": "https://bugzilla.suse.com/1190432"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3752"
    },
    {
      "cve": "CVE-2021-3753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3753",
          "url": "https://www.suse.com/security/cve/CVE-2021-3753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190025 for CVE-2021-3753",
          "url": "https://bugzilla.suse.com/1190025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3753"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    },
    {
      "cve": "CVE-2021-3759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3759",
          "url": "https://www.suse.com/security/cve/CVE-2021-3759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190115 for CVE-2021-3759",
          "url": "https://bugzilla.suse.com/1190115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3759"
    },
    {
      "cve": "CVE-2021-3760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3760",
          "url": "https://www.suse.com/security/cve/CVE-2021-3760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190067 for CVE-2021-3760",
          "url": "https://bugzilla.suse.com/1190067"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3760"
    },
    {
      "cve": "CVE-2021-3764",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3764"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3764",
          "url": "https://www.suse.com/security/cve/CVE-2021-3764"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3764",
          "url": "https://bugzilla.suse.com/1190534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194518 for CVE-2021-3764",
          "url": "https://bugzilla.suse.com/1194518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3764"
    },
    {
      "cve": "CVE-2021-3772",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3772"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3772",
          "url": "https://www.suse.com/security/cve/CVE-2021-3772"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190351 for CVE-2021-3772",
          "url": "https://bugzilla.suse.com/1190351"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3772"
    },
    {
      "cve": "CVE-2021-38160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38160",
          "url": "https://www.suse.com/security/cve/CVE-2021-38160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190117 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190118 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38160"
    },
    {
      "cve": "CVE-2021-38198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38198",
          "url": "https://www.suse.com/security/cve/CVE-2021-38198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189262 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189278 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-38198"
    },
    {
      "cve": "CVE-2021-38204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38204",
          "url": "https://www.suse.com/security/cve/CVE-2021-38204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189291 for CVE-2021-38204",
          "url": "https://bugzilla.suse.com/1189291"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38204"
    },
    {
      "cve": "CVE-2021-40490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40490",
          "url": "https://www.suse.com/security/cve/CVE-2021-40490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190159 for CVE-2021-40490",
          "url": "https://bugzilla.suse.com/1190159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192775 for CVE-2021-40490",
          "url": "https://bugzilla.suse.com/1192775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-40490"
    },
    {
      "cve": "CVE-2021-41864",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-41864"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-41864",
          "url": "https://www.suse.com/security/cve/CVE-2021-41864"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191317 for CVE-2021-41864",
          "url": "https://bugzilla.suse.com/1191317"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191318 for CVE-2021-41864",
          "url": "https://bugzilla.suse.com/1191318"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-41864"
    },
    {
      "cve": "CVE-2021-42008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42008",
          "url": "https://www.suse.com/security/cve/CVE-2021-42008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191315 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1191315"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191660 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1191660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-42008",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42008"
    },
    {
      "cve": "CVE-2021-42252",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42252"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42252",
          "url": "https://www.suse.com/security/cve/CVE-2021-42252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190479 for CVE-2021-42252",
          "url": "https://bugzilla.suse.com/1190479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192444 for CVE-2021-42252",
          "url": "https://bugzilla.suse.com/1192444"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42252"
    },
    {
      "cve": "CVE-2021-42739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-42739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-42739",
          "url": "https://www.suse.com/security/cve/CVE-2021-42739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184673 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1184673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192036 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1192036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196722 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1196722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-42739",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-12-02T07:19:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-42739"
    }
  ]
}
  suse-su-2021:2645-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2021-3609: Fixed a potential local privilege escalation in the  CAN BCM networking protocol (bsc#1187215).\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw in the joystick devices subsystem. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2021-35039: Fixed mishandling of signature verification. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bsc#1188080).\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: DPTF: Fix reading of attributes (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: PM / fan: Put fan device IDs into separate header file (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: firewire-motu: fix detection for S/PDIF source on optical interface in v2 protocol (git-fixes).\n- ALSA: firewire-motu: fix stream format for MOTU 8pre FireWire (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Apply LED fixup for HP Dragonfly G1, too (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: hda/realtek: Fix pop noise and 2 Front Mic issues on a machine (git-fixes).\n- ALSA: hda/realtek: Improve fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 830 G8 Notebook PC (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook x360 830 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 450 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 630 G8 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: hda: intel-dsp-cfg: add missing ElkhartLake PCI ID (git-fixes).\n- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: pcm - fix mmap capability check for the snd-dummy driver (git-fixes).\n- ALSA: pcm: Call substream ack() method upon compat mmap commit (git-fixes).\n- ALSA: pcm: Fix mmap capability check (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: Add missing proc text entry for BESPOKEN type (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).\n- ALSA: usb-audio: Fix OOB access at proc output (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- ALSA: usx2y: Avoid camelCase (git-fixes).\n- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).\n- ASoC: Intel: sof_sdw: add SOF_RT715_DAI_ID_FIX for AlderLake (git-fixes).\n- ASoC: Intel: sof_sdw: add mutual exclusion between PCH DMIC and RT715 (git-fixes).\n- ASoC: SOF: loader: Use snd_sof_dsp_block_read() instead sof_block_read() (git-fixes).\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: fsl_spdif: Fix error handler with pm_runtime_enable (git-fixes).\n- ASoC: fsl_spdif: Fix unexpected interrupt after suspend (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).\n- ASoC: intel/boards: add missing MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: max98373-sdw: add missing memory allocation check (git-fixes).\n- ASoC: max98373-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rk3328: fix missing clk_disable_unprepare() on error in rk3328_platform_probe() (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ASoC: rt1308-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).\n- ASoC: rt5682-sdw: set regcache_cache_only false before reading RT5682_DEVICE_ID (git-fixes).\n- ASoC: rt5682-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt5682: Disable irq on shutdown (git-fixes).\n- ASoC: rt5682: Fix a problem with error handling in the io init function of the soundwire (git-fixes).\n- ASoC: rt5682: fix getting the wrong device id when the suspend_stress_test (git-fixes).\n- ASoC: rt700-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt711-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt715-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: soc-pcm: fix the return value in dpcm_apply_symmetry() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- ASoC: wm_adsp: Correct wm_coeff_tlv_get handling (git-fixes).\n- Bluetooth: Fix alt settings for incoming SCO with transparent coding format (git-fixes).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: L2CAP: Fix invalid access if ECRED Reconfigure fails (git-fixes).\n- Bluetooth: L2CAP: Fix invalid access on ECRED Connection response (git-fixes).\n- Bluetooth: Remove spurious error message (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btintel: Add infrastructure to read controller information (bsc#1188893).\n- Bluetooth: btintel: Check firmware version before download (bsc#1188893).\n- Bluetooth: btintel: Collect tlv based active firmware build info in FW mode (bsc#1188893).\n- Bluetooth: btintel: Consolidate intel_version parsing (bsc#1188893).\n- Bluetooth: btintel: Consolidate intel_version_tlv parsing (bsc#1188893).\n- Bluetooth: btintel: Fix endianness issue for TLV version information (bsc#1188893).\n- Bluetooth: btintel: Fix offset calculation boot address parameter (bsc#1188893).\n- Bluetooth: btintel: Functions to send firmware header / payload (bsc#1188893).\n- Bluetooth: btintel: Move operational checks after version check (bsc#1188893).\n- Bluetooth: btintel: Refactor firmware download function (bsc#1188893).\n- Bluetooth: btintel: Reorganized bootloader mode tlv checks in intel_version_tlv parsing (bsc#1188893).\n- Bluetooth: btintel: Replace zero-length array with flexible-array member (bsc#1188893).\n- Bluetooth: btintel: Skip reading firmware file version while in bootloader mode (bsc#1188893).\n- Bluetooth: btqca: Do not modify firmware contents in-place (git-fixes).\n- Bluetooth: btusb: Add *setup* function for new generation Intel controllers (bsc#1188893).\n- Bluetooth: btusb: Add support USB ALT 3 for WBS (git-fixes).\n- Bluetooth: btusb: Add support for GarfieldPeak controller (bsc#1188893).\n- Bluetooth: btusb: Consolidate code for waiting firmware download (bsc#1188893).\n- Bluetooth: btusb: Define a function to construct firmware filename (bsc#1188893).\n- Bluetooth: btusb: Enable MSFT extension for Intel controllers (bsc#1188893).\n- Bluetooth: btusb: Fix failing to init controllers with operation firmware (bsc#1188893).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: btusb: Helper function to download firmware to Intel adapters (bsc#1188893).\n- Bluetooth: btusb: Map Typhoon peak controller to BTUSB_INTEL_NEWGEN (bsc#1188893).\n- Bluetooth: btusb: Update boot parameter specific to SKU (bsc#1188893).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Bluetooth: btusb: print firmware file name on error loading firmware (bsc#1188893).\n- Bluetooth: hci_intel: drop strange le16_to_cpu() against u8 values (bsc#1188893).\n- Bluetooth: hci_intel: enable on new platform (bsc#1188893).\n- Bluetooth: hci_intel: switch to list_for_each_entry() (bsc#1188893).\n- Bluetooth: hci_qca: fix potential GPF (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- Bluetooth: mgmt: Fix the command returns garbage parameter value (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).\n- KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available (bsc#1188703).\n- KVM: nVMX: Consult only the \u0027basic\u0027 exit reason when routing nested exit (bsc#1188773).\n- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).\n- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: intel-gw: Fix INTx enable (git-fixes).\n- PCI: intel-gw: Fix INTx enable (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).\n- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).\n- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).\n- RDMA/cma: Protect RMW with qp_mutex (git-fixes).\n- RDMA/hns: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/mlx4: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/mlx5: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/rtrs-clt: Check if the queue_depth has changed during a reconnection (jsc#SLE-15176).\n- RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its stats (jsc#SLE-15176).\n- RDMA/rtrs-clt: Fix memory leak of not-freed sess-\u003estats and stats-\u003epcpu_stats (jsc#SLE-15176).\n- RDMA/rtrs-srv: Fix memory leak of unfreed rtrs_srv_stats object (jsc#SLE-15176).\n- RDMA/rtrs-srv: Fix memory leak when having multiple sessions (jsc#SLE-15176).\n- RDMA/rtrs-srv: Replace atomic_t with percpu_ref for ids_inflight (jsc#SLE-15176).\n- RDMA/rtrs-srv: Set minimal max_send_wr and max_recv_wr (jsc#SLE-15176).\n- RDMA/rtrs: Do not reset hb_missed_max after re-connection (jsc#SLE-15176).\n- RDMA/srp: Fix a recently introduced memory leak (jsc#SLE-15176).\n- Revert \u0027ACPI: resources: Add checks for ACPI IRQ override\u0027 (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027Bluetooth: btintel: Fix endianness issue for TLV version information\u0027 (bsc#1188893).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- Revert \u0027be2net: disable bh with spin_lock in be_process_mcc\u0027 (git-fixes).\n- Revert \u0027drm/i915: Propagate errors on awaiting already signaled fences\u0027 (git-fixes).\n- Revert \u0027drm: add a locked version of drm_is_current_master\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- Revert \u0027iwlwifi: remove wide_cmd_header field\u0027 (bsc#1187495).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1184631).\n- bcache: remove bcache device self-defined readahead (bsc#1184631).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: do not disable an already disabled PCI device (git-fixes).\n- bonding: Add struct bond_ipesc to manage SA (bsc#1176447).\n- bonding: disallow setting nested bonding + ipsec offload (bsc#1176447).\n- bonding: fix build issue (git-fixes).\n- bonding: fix incorrect return value of bond_ipsec_offload_ok() (bsc#1176447).\n- bonding: fix null dereference in bond_ipsec_add_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_add_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_del_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_offload_ok() (bsc#1176447).\n- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- brcmfmac: Fix a double-free in brcmf_sdio_bus_reset (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- cadence: force nonlinear buffers to be cloned (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188748).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: imx8mq: remove SYS PLL 1/2 clock gates (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: si5341: Update initialization magic (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- coresight: Propagate symlink failure (git-fixes).\n- coresight: core: Fix use of uninitialized pointer (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: Revert unnecessary patches that fix unreal use-after-free bugs (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix IRQ free race during driver unload (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).\n- docs: virt/kvm: close inline string literal (bsc#1188703).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/dc: Fix a missing check bug in dm_dp_mst_detect() (git-fixes).\n- drm/amd/display: Avoid HDCP over-read and corruption (git-fixes).\n- drm/amd/display: Fix DCN 3.01 DSCCLK validation (git-fixes).\n- drm/amd/display: Fix build warnings (git-fixes).\n- drm/amd/display: Fix off-by-one error in DML (git-fixes).\n- drm/amd/display: Release MST resources on switch from MST to SST (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amd/display: fix HDCP reset sequence on reinitialize (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdgpu: enable sdma0 tmz for Raven/Renoir(V2) (git-fixes).\n- drm/amdgpu: remove unsafe optimization to drop preamble ib (git-fixes).\n- drm/amdgpu: update golden setting for sienna_cichlid (git-fixes).\n- drm/amdgpu: wait for moving fence after pinning (git-fixes).\n- drm/amdkfd: Fix circular lock in nocpsch path (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/amdkfd: fix circular locking on get_wave_state (git-fixes).\n- drm/amdkfd: use allowed domain for vmbo validation (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge/sii8620: fix dependency on extcon (git-fixes).\n- drm/bridge: Fix the stop condition of drm_bridge_chain_pre_enable() (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm/bridge: nwl-dsi: Force a full modeset when crtc_state-\u003eactive is changed to be true (git-fixes).\n- drm/dp_mst: Do not set proposed vcpi directly (git-fixes).\n- drm/gma500: Add the missed drm_gem_object_put() in psb_user_framebuffer_create() (git-fixes).\n- drm/i915/display: Do not zero past infoframes.vsc (git-fixes).\n- drm/i915/gvt: Clear d3_entered on elsp cmd submission (git-fixes).\n- drm/i915/selftests: use vma_lookup() in __igt_mmap() (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm/dpu: Fix sm8250_mdp register length (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/msm: Fix error return code in msm_drm_init() (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/nouveau: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/nouveau: fix dma_address check for CPU/GPU sync (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/panel: nt35510: Do not fail if DSI read fails (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/radeon: Call radeon_suspend_kms() in radeon_pci_shutdown() for Loongson64 (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: cdn-dp: fix sign extension on an int multiply for a u64 result (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/rockchip: lvds: Fix an error handling path (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/scheduler: Fix hang when sched_entity released (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: Fix clock source for VEC PixelValve on BCM2711 (git-fixes).\n- drm/vc4: crtc: Skip the TXP (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/vc4: hdmi: Fix PM reference leak in vc4_hdmi_encoder_pre_crtc_co() (git-fixes).\n- drm/vc4: hdmi: Fix error path of hpd-gpios (git-fixes).\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- drm/vc4: hdmi: Prevent clock unbalance (git-fixes).\n- drm/vc4: txp: Properly set the possible_crtcs mask (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/vmwgfx: Fix cpu updates of coherent multisample surfaces (git-fixes).\n- drm/vmwgfx: Mark a surface gpu-dirty after the SVGA3dCmdDXGenMips command (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- drm: add a locked version of drm_is_current_master (git-fixes).\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm: bridge: add missing word in Analogix help text (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm: rockchip: add missing registers for RK3066 (git-fixes).\n- drm: rockchip: add missing registers for RK3188 (git-fixes).\n- drm: rockchip: set alpha_en to 0 if it is not used (git-fixes).\n- e1000e: Check the PCIm state (git-fixes).\n- e1000e: Fix an error handling path in \u0027e1000_probe()\u0027 (git-fixes).\n- efi/tpm: Differentiate missing and invalid final event log table (bsc#1188036).\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fbmem: Do not delete the mode that is still in use (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).\n- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).\n- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: core: Disable client irq on reboot/shutdown (git-fixes).\n- i2c: designware: Adjust bus_freq_hz when refuse high speed mode set (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).\n- i40e: Fix error handling in i40e_vsi_open (git-fixes).\n- i40e: Fix missing rtnl locking when setting up pf switch (jsc#SLE-13701).\n- i40e: fix PTP on 5Gb links (jsc#SLE-13701).\n- iavf: Fix an error handling path in \u0027iavf_probe()\u0027 (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).\n- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).\n- igb: Fix an error handling path in \u0027igb_probe()\u0027 (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igb: Fix use-after-free error during reset (git-fixes).\n- igc: Fix an error handling path in \u0027igc_probe()\u0027 (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- integrity: use arch_ima_get_secureboot instead of checking EFI_SECURE_BOOT when loading MokListRT (bsc#1188366).\n- intel_th: Wait until port is in reset before programming it (git-fixes).\n- iwl-trans: move dev_cmd_offs, page_offs to a common trans header (bsc#1187495).\n- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_enqueue_hcmd() (git-fixes).\n- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_gen2_enqueue_hcmd() (git-fixes).\n- iwlwifi: acpi: evaluate dsm to disable 5.8GHz channels (bsc#1187495).\n- iwlwifi: acpi: in non acpi compilations remove iwl_sar_geo_init (bsc#1187495).\n- iwlwifi: acpi: prepare SAR profile selection code for multiple sizes (bsc#1187495).\n- iwlwifi: acpi: remove dummy definition of iwl_sar_set_profile() (bsc#1187495).\n- iwlwifi: acpi: rename geo structs to contain versioning (bsc#1187495).\n- iwlwifi: acpi: support ppag table command v2 (bsc#1187495).\n- iwlwifi: add a common struct for all iwl_tx_power_cmd versions (bsc#1187495).\n- iwlwifi: add trans op to set PNVM (bsc#1187495).\n- iwlwifi: align RX status flags with firmware (bsc#1187495).\n- iwlwifi: api: fix u32 -\u003e __le32 (bsc#1187495).\n- iwlwifi: bump FW API to 57 for AX devices (bsc#1187495).\n- iwlwifi: bump FW API to 59 for AX devices (bsc#1187495).\n- iwlwifi: calib: Demote seemingly unintentional kerneldoc header (bsc#1187495).\n- iwlwifi: dbg: Do not touch the tlv data (bsc#1187495).\n- iwlwifi: dbg: add debug host notification (DHN) time point (bsc#1187495).\n- iwlwifi: dbg: add dumping special device memory (bsc#1187495).\n- iwlwifi: dbg: remove IWL_FW_INI_TIME_POINT_WDG_TIMEOUT (bsc#1187495).\n- iwlwifi: do not export acpi functions unnecessarily (bsc#1187495).\n- iwlwifi: dvm: Demote a couple of nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: devices: Fix function documentation formatting issues (bsc#1187495).\n- iwlwifi: dvm: lib: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: rxon: Demote non-conformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: scan: Demote a few nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: sta: Demote a bunch of nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: tx: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: enable twt by default (bsc#1187495).\n- iwlwifi: fix 11ax disabled bit in the regulatory capability flags (bsc#1187495).\n- iwlwifi: fix sar geo table initialization (bsc#1187495).\n- iwlwifi: fw: add default value for iwl_fw_lookup_cmd_ver (bsc#1187495).\n- iwlwifi: fw: move assert descriptor parser to common code (bsc#1187495).\n- iwlwifi: increase PNVM load timeout (bsc#1187495).\n- iwlwifi: iwl-drv: Provide descriptions debugfs dentries (bsc#1187495).\n- iwlwifi: iwl-trans: move tfd to trans layer (bsc#1187495).\n- iwlwifi: move PNVM implementation to common code (bsc#1187495).\n- iwlwifi: move all bus-independent TX functions to common code (bsc#1187495).\n- iwlwifi: move bc_pool to a common trans header (bsc#1187495).\n- iwlwifi: move bc_table_dword to a common trans header (bsc#1187495).\n- iwlwifi: msix: limit max RX queues for 9000 family (bsc#1187495).\n- iwlwifi: mvm: Add FTM initiator RTT smoothing logic (bsc#1187495).\n- iwlwifi: mvm: Do not install CMAC/GMAC key in AP mode (bsc#1187495).\n- iwlwifi: mvm: add PROTECTED_TWT firmware API (bsc#1187495).\n- iwlwifi: mvm: add a get lmac id function (bsc#1187495).\n- iwlwifi: mvm: add an option to add PASN station (bsc#1187495).\n- iwlwifi: mvm: add d3 prints (bsc#1187495).\n- iwlwifi: mvm: add support for new WOWLAN_TSC_RSC_PARAM version (bsc#1187495).\n- iwlwifi: mvm: add support for new version of WOWLAN_TKIP_SETTING_API_S (bsc#1187495).\n- iwlwifi: mvm: add support for range request command ver 11 (bsc#1187495).\n- iwlwifi: mvm: add support for responder dynamic config command version 3 (bsc#1187495).\n- iwlwifi: mvm: assign SAR table revision to the command later (bsc#1187495).\n- iwlwifi: mvm: avoid possible NULL pointer dereference (bsc#1187495).\n- iwlwifi: mvm: clear all scan UIDs (bsc#1187495).\n- iwlwifi: mvm: d3: parse wowlan status version 11 (bsc#1187495).\n- iwlwifi: mvm: d3: support GCMP ciphers (bsc#1187495).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: mvm: do not check if CSA event is running before removing (bsc#1187495).\n- iwlwifi: mvm: do not send a CSA command the firmware does not know (bsc#1187495).\n- iwlwifi: mvm: fix error print when session protection ends (git-fixes).\n- iwlwifi: mvm: fix suspicious rcu usage warnings (bsc#1187495).\n- iwlwifi: mvm: fix the type we use in the PPAG table validity checks (bsc#1187495).\n- iwlwifi: mvm: get number of stations from TLV (bsc#1187495).\n- iwlwifi: mvm: ignore the scan duration parameter (bsc#1187495).\n- iwlwifi: mvm: initiator: add option for adding a PASN responder (bsc#1187495).\n- iwlwifi: mvm: location: set the HLTK when PASN station is added (bsc#1187495).\n- iwlwifi: mvm: ops: Remove unused static struct \u0027iwl_mvm_debug_names\u0027 (bsc#1187495).\n- iwlwifi: mvm: prepare roc_done_wk to work sync (bsc#1187495).\n- iwlwifi: mvm: process ba-notifications also when sta rcu is invalid (bsc#1187495).\n- iwlwifi: mvm: re-enable TX after channel switch (bsc#1187495).\n- iwlwifi: mvm: read and parse SKU ID if available (bsc#1187495).\n- iwlwifi: mvm: remove memset of kek_kck command (bsc#1187495).\n- iwlwifi: mvm: remove redundant log in iwl_mvm_tvqm_enable_txq() (bsc#1187495).\n- iwlwifi: mvm: remove redundant support_umac_log field (bsc#1187495).\n- iwlwifi: mvm: responder: allow to set only the HLTK for an associated station (bsc#1187495).\n- iwlwifi: mvm: ring the doorbell and wait for PNVM load completion (bsc#1187495).\n- iwlwifi: mvm: rs-fw: handle VHT extended NSS capability (bsc#1187495).\n- iwlwifi: mvm: send stored PPAG command instead of local (bsc#1187495).\n- iwlwifi: mvm: set PROTECTED_TWT feature if supported by firmware (bsc#1187495).\n- iwlwifi: mvm: set PROTECTED_TWT in MAC data policy (bsc#1187495).\n- iwlwifi: mvm: set enabled in the PPAG command properly (bsc#1187495).\n- iwlwifi: mvm: stop claiming NL80211_EXT_FEATURE_SET_SCAN_DWELL (bsc#1187495).\n- iwlwifi: mvm: store PPAG enabled/disabled flag properly (bsc#1187495).\n- iwlwifi: mvm: support ADD_STA_CMD_API_S ver 12 (bsc#1187495).\n- iwlwifi: mvm: support more GTK rekeying algorithms (bsc#1187495).\n- iwlwifi: mvm: support new KEK KCK api (bsc#1187495).\n- iwlwifi: mvm: tx: Demote misuse of kernel-doc headers (bsc#1187495).\n- iwlwifi: mvm: use CHECKSUM_COMPLETE (bsc#1187495).\n- iwlwifi: mvm: utils: Fix some doc-rot (bsc#1187495).\n- iwlwifi: pcie: avoid potential PNVM leaks (bsc#1187495).\n- iwlwifi: pcie: do not disable interrupts for reg_lock (bsc#1187495).\n- iwlwifi: pcie: fix context info freeing (git-fixes).\n- iwlwifi: pcie: fix the xtal latency value for a few qu devices (bsc#1187495).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- iwlwifi: pcie: implement set_pnvm op (bsc#1187495).\n- iwlwifi: pcie: make iwl_pcie_txq_update_byte_cnt_tbl bus independent (bsc#1187495).\n- iwlwifi: pcie: properly set LTR workarounds on 22000 devices (bsc#1187495).\n- iwlwifi: phy-ctxt: add new API VER 3 for phy context cmd (bsc#1187495).\n- iwlwifi: pnvm: do not skip everything when not reloading (bsc#1187495).\n- iwlwifi: pnvm: do not try to load after failures (bsc#1187495).\n- iwlwifi: pnvm: increment the pointer before checking the TLV (bsc#1187495).\n- iwlwifi: pnvm: set the PNVM again if it was already loaded (bsc#1187495).\n- iwlwifi: provide gso_type to GSO packets (bsc#1187495).\n- iwlwifi: queue: bail out on invalid freeing (bsc#1187495).\n- iwlwifi: read and parse PNVM file (bsc#1187495).\n- iwlwifi: regulatory: regulatory capabilities api change (bsc#1187495).\n- iwlwifi: remove iwl_validate_sar_geo_profile() export (bsc#1187495).\n- iwlwifi: remove wide_cmd_header field (bsc#1187495).\n- iwlwifi: rs: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: rs: align to new TLC config command API (bsc#1187495).\n- iwlwifi: rs: set RTS protection for all non legacy rates (bsc#1187495).\n- iwlwifi: sta: defer ADDBA transmit in case reclaimed SN != next SN (bsc#1187495).\n- iwlwifi: stats: add new api fields for statistics cmd/ntfy (bsc#1187495).\n- iwlwifi: support REDUCE_TX_POWER_CMD version 6 (bsc#1187495).\n- iwlwifi: support version 3 of GEO_TX_POWER_LIMIT (bsc#1187495).\n- iwlwifi: support version 5 of the alive notification (bsc#1187495).\n- iwlwifi: thermal: support new temperature measurement API (bsc#1187495).\n- iwlwifi: update prph scratch structure to include PNVM data (bsc#1187495).\n- iwlwifi: use correct group for alive notification (bsc#1187495).\n- iwlwifi: wowlan: adapt to wowlan status API version 10 (bsc#1187495).\n- iwlwifi: yoyo: add support for internal buffer allocation in D3 (bsc#1187495).\n- ixgbe: Fix an error handling path in \u0027ixgbe_probe()\u0027 (git-fixes).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- ixgbevf: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).\n- kABI compatibility fix for max98373_priv struct (git-fixes).\n- kABI workaround for btintel symbol changes (bsc#1188893).\n- kABI workaround for intel_th_driver (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kabi/severities: ignore kABI of iwlwifi symbols (bsc#1187495) iwlwifi driver consists of several modules and all exported symbols are internal uses. Let\u0027s ignore kABI checks of those.\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).\n- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: class: The -ENOTSUPP should never be seen by user space (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- mac80211: consider per-CPU statistics if present (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- mac80211: reset profile_periodicity/ema_ap (git-fixes).\n- mac80211_hwsim: add concurrent channels scanning support over virtio (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).\n- misc: alcor_pci: fix inverted branch condition (git-fixes).\n- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mt76: mt7603: set 0 as min coverage_class value (git-fixes).\n- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).\n- mt76: mt7615: fix fixed-rate tx status reporting (git-fixes).\n- mt76: mt7615: increase MCU command timeout (git-fixes).\n- mt76: mt7915: fix IEEE80211_HE_PHY_CAP7_MAX_NC for station mode (git-fixes).\n- mt76: set dma-done flag for flushed descriptors (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mvpp2: suppress warning (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).\n- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).\n- net/sched: act_ct: remove and free nf_table callbacks (jsc#SLE-15172).\n- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).\n- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).\n- net: fec_ptp: fix issue caused by refactor the fec_devtype (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: ipw2x00,iwlegacy,iwlwifi: Remove in_interrupt() from debug macros (bsc#1187495).\n- net: iwlwifi: Remove in_interrupt() from tracing macro (bsc#1187495).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mvpp2: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- net: netdevsim: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).\n- net: phy: fix save wrong speed and duplex problem if autoneg is on (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: phy: realtek: add delay to fix RXC generation issue (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).\n- netfilter: ctnetlink: suspicious RCU usage in ctnetlink_dump_helpinfo (bsc#1176447).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).\n- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- powerpc/stacktrace: Fix spurious \u0027stale\u0027 traces in raise_backtrace_ipi() (bsc#1156395).\n- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).\n- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).\n- prctl: PR_{G,S}ET_IO_FLUSHER to support controlling memory reclaim (bsc#1188752).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).\n- pwm: imx1: Do not disable clocks at device remove time (git-fixes).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).\n- r8152: Fix potential PM refcount imbalance (bsc#1186194).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).\n- rbd: always kick acquire on \u0027acquired\u0027 and \u0027released\u0027 notifications (bsc#1188746).\n- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi6421: Fix getting wrong drvdata (git-fixes).\n- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- replaced with upstream security mitigation cleanup\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- rtw88: 8822c: fix lc calibration timing (git-fixes).\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- scsi: ibmvfc: Fix command state accounting and stale response detection (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial: 8250_pci: Add support for new HPE serial device (git-fixes).\n- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).\n- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- sfp: Fix error handing in sfp_probe() (git-fixes).\n- skbuff: Fix build with SKB extensions disabled (jsc#SLE-15172).\n- skbuff: Release nfct refcount on napi stolen or re-used skbs (jsc#SLE-15172).\n- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: cadence: Correct initialisation of runtime PM again (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121). \n- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).\n- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).\n- thermal/drivers/int340x/processor_thermal: Fix tcc setting (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- thunderbolt: Bond lanes only when dual_link_port != NULL in alloc_dev_default() (git-fixes).\n- timers: Fix get_next_timer_interrupt() with no timers pending (git-fixes)\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify \u0026 fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).\n- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(\u0026port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: update power supply once partner accepts (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).\n- wireless: carl9170: fix LEDS build errors \u0026 warnings (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- xen/events: reset active flag for lateeoi events later (git-fixes).\n- xfrm: Fix xfrm offload fallback fail case (bsc#1176447).\n- xfrm: delete xfrm4_output_finish xfrm6_output_finish declarations (bsc#1176447).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n- xsk: Fix missing validation for skb and unaligned mode (jsc#SLE-13706).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2645,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2645",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2645-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2645-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212645-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2645-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152472",
        "url": "https://bugzilla.suse.com/1152472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153274",
        "url": "https://bugzilla.suse.com/1153274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155518",
        "url": "https://bugzilla.suse.com/1155518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170511",
        "url": "https://bugzilla.suse.com/1170511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176447",
        "url": "https://bugzilla.suse.com/1176447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179243",
        "url": "https://bugzilla.suse.com/1179243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180092",
        "url": "https://bugzilla.suse.com/1180092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180814",
        "url": "https://bugzilla.suse.com/1180814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184631",
        "url": "https://bugzilla.suse.com/1184631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185308",
        "url": "https://bugzilla.suse.com/1185308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185791",
        "url": "https://bugzilla.suse.com/1185791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186194",
        "url": "https://bugzilla.suse.com/1186194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186206",
        "url": "https://bugzilla.suse.com/1186206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187215",
        "url": "https://bugzilla.suse.com/1187215"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187495",
        "url": "https://bugzilla.suse.com/1187495"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187585",
        "url": "https://bugzilla.suse.com/1187585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188036",
        "url": "https://bugzilla.suse.com/1188036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188080",
        "url": "https://bugzilla.suse.com/1188080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188121",
        "url": "https://bugzilla.suse.com/1188121"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188126",
        "url": "https://bugzilla.suse.com/1188126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188176",
        "url": "https://bugzilla.suse.com/1188176"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188267",
        "url": "https://bugzilla.suse.com/1188267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188268",
        "url": "https://bugzilla.suse.com/1188268"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188269",
        "url": "https://bugzilla.suse.com/1188269"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188323",
        "url": "https://bugzilla.suse.com/1188323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188366",
        "url": "https://bugzilla.suse.com/1188366"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188445",
        "url": "https://bugzilla.suse.com/1188445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188504",
        "url": "https://bugzilla.suse.com/1188504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188683",
        "url": "https://bugzilla.suse.com/1188683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188703",
        "url": "https://bugzilla.suse.com/1188703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188720",
        "url": "https://bugzilla.suse.com/1188720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188746",
        "url": "https://bugzilla.suse.com/1188746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188747",
        "url": "https://bugzilla.suse.com/1188747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188748",
        "url": "https://bugzilla.suse.com/1188748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188752",
        "url": "https://bugzilla.suse.com/1188752"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188770",
        "url": "https://bugzilla.suse.com/1188770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188771",
        "url": "https://bugzilla.suse.com/1188771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188772",
        "url": "https://bugzilla.suse.com/1188772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188773",
        "url": "https://bugzilla.suse.com/1188773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188774",
        "url": "https://bugzilla.suse.com/1188774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188777",
        "url": "https://bugzilla.suse.com/1188777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188893",
        "url": "https://bugzilla.suse.com/1188893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-21781 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-21781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35039 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3609 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3612 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3612/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-10T08:03:30Z",
      "generator": {
        "date": "2021-08-10T08:03:30Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2645-1",
      "initial_release_date": "2021-08-10T08:03:30Z",
      "revision_history": [
        {
          "date": "2021-08-10T08:03:30Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.3.18-38.17.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.3.18-38.17.1.noarch",
                  "product_id": "kernel-devel-azure-5.3.18-38.17.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.3.18-38.17.1.noarch",
                "product": {
                  "name": "kernel-source-azure-5.3.18-38.17.1.noarch",
                  "product_id": "kernel-source-azure-5.3.18-38.17.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "dlm-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "gfs2-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-devel-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-extra-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-azure-optional-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-azure-optional-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "kernel-syms-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "kselftests-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.3.18-38.17.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.3.18-38.17.1.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.3.18-38.17.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.3.18-38.17.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kernel-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.3.18-38.17.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.3.18-38.17.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.3.18-38.17.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.3.18-38.17.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.3.18-38.17.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.3.18-38.17.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.3.18-38.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-21781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-21781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process\u0027s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-21781",
          "url": "https://www.suse.com/security/cve/CVE-2021-21781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188445 for CVE-2021-21781",
          "url": "https://bugzilla.suse.com/1188445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:30Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-21781"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:30Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-35039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35039",
          "url": "https://www.suse.com/security/cve/CVE-2021-35039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188080 for CVE-2021-35039",
          "url": "https://bugzilla.suse.com/1188080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188126 for CVE-2021-35039",
          "url": "https://bugzilla.suse.com/1188126"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:30Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-35039"
    },
    {
      "cve": "CVE-2021-3609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3609",
          "url": "https://www.suse.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187215 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1187215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188323 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188720 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1196810"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:30Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3609"
    },
    {
      "cve": "CVE-2021-3612",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3612"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3612",
          "url": "https://www.suse.com/security/cve/CVE-2021-3612"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187585 for CVE-2021-3612",
          "url": "https://bugzilla.suse.com/1187585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:30Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3612"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:30Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.17.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.17.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:30Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2021:2647-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. (bsc#1176724).\n- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bsc#1187038 ).\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- USB: move many drivers to use DEVICE_ATTR_WO (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).\n- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).\n- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188750).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-\u003eprepath (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- cosa: Add missing kfree in error path of cosa_write (git-fixes).\n- crypto: do not free algorithm before using (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- e100: handle eeprom as little endian (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add NULL pointer checks when freeing irqs (bsc#1176940).\n- gve: Add basic driver framework for Compute Engine Virtual NIC (jsc#SLE-10538).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add ethtool support (jsc#SLE-10538).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Add workqueue and reset support (jsc#SLE-10538).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: Copy and paste bug in gve_get_stats() (jsc#SLE-10538).\n- gve: Correct SKB queue index validation (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (bsc#1176940).\n- gve: Fix case where desc_cnt and data_cnt can get out of sync (jsc#SLE-10538).\n- gve: Fix error return code in gve_alloc_qpls() (jsc#SLE-10538).\n- gve: Fix the queue page list allocated pages count (bsc#1176940).\n- gve: Fix u64_stats_sync to initialize start (jsc#SLE-10538).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Fixes DMA synchronization (jsc#SLE-10538).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Remove the exporting of gve_probe (jsc#SLE-10538).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Update mgmt_msix_idx if num_ntfy changes (bsc#1176940).\n- gve: Upgrade memory barrier in poll routine (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: fix -ENOMEM null check on a page allocation (jsc#SLE-10538).\n- gve: fix dma sync bug where not all pages synced (bsc#1176940).\n- gve: fix unused variable/label warnings (jsc#SLE-10538).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- gve: replace kfree with kvfree (jsc#SLE-10538).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- kabi: fix nvme_wait_freeze_timeout() return type (bsc#1181161).\n- kfifo: DECLARE_KIFO_PTR(fifo, u64) does not work on arm 32 bit (git-fixes).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).\n- net/mlx5: Query PPS pin operational status before registering it (git-fixes).\n- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).\n- net: Google gve: Remove dma_wmb() before ringing doorbell (bsc#1176940).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: broadcom CNIC: requires MMU (git-fixes).\n- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1181161).\n- nvme-multipath: fix double initialization of ANA state (bsc#1181161).\n- nvme-rdma: add clean action for failed reconnection (bsc#1181161).\n- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1181161).\n- nvme-rdma: use cancel tagset helper for tear down (bsc#1181161).\n- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1181161).\n- nvmet: use new ana_log_size instead the old one (bsc#1181161).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries/scm: Use a specific endian format for storing uuid from the device tree (bsc#1113295, git-fixes).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (git-fixes).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: vudc synchronize sysfs code paths (git-fixes).\n- usbip: vudc: fix missing unlock on error in usbip_sockfd_store() (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- xen-pciback: reconfigure also from backend watch handler (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2647,SUSE-SLE-HA-12-SP5-2021-2647,SUSE-SLE-Live-Patching-12-SP5-2021-2647,SUSE-SLE-SDK-12-SP5-2021-2647,SUSE-SLE-SERVER-12-SP5-2021-2647,SUSE-SLE-WE-12-SP5-2021-2647",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2647-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2647-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212647-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2647-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176724",
        "url": "https://bugzilla.suse.com/1176724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176931",
        "url": "https://bugzilla.suse.com/1176931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179195",
        "url": "https://bugzilla.suse.com/1179195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181161",
        "url": "https://bugzilla.suse.com/1181161"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186206",
        "url": "https://bugzilla.suse.com/1186206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186672",
        "url": "https://bugzilla.suse.com/1186672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187038",
        "url": "https://bugzilla.suse.com/1187038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187846",
        "url": "https://bugzilla.suse.com/1187846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188026",
        "url": "https://bugzilla.suse.com/1188026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188750",
        "url": "https://bugzilla.suse.com/1188750"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0429 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0429/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36386 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36386/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-10T08:18:19Z",
      "generator": {
        "date": "2021-08-10T08:18:19Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2647-1",
      "initial_release_date": "2021-08-10T08:18:19Z",
      "revision_history": [
        {
          "date": "2021-08-10T08:18:19Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.83.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.83.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.83.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-default-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.aarch64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.83.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.83.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.83.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.83.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.83.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-122.83.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-122.83.1.noarch",
                  "product_id": "kernel-devel-4.12.14-122.83.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-122.83.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-122.83.1.noarch",
                  "product_id": "kernel-docs-4.12.14-122.83.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-122.83.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-122.83.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-122.83.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-122.83.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-122.83.1.noarch",
                  "product_id": "kernel-macros-4.12.14-122.83.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-122.83.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-122.83.1.noarch",
                  "product_id": "kernel-source-4.12.14-122.83.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-122.83.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-122.83.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-122.83.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.83.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.ppc64le",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.83.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-122.83.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.83.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.83.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.83.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.83.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-default-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-default-kgraft-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-syms-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-122.83.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.83.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-122.83.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.83.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.83.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.83.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.83.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.83.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-default-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.x86_64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.83.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.83.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.83.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-122.83.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-122.83.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.83.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.83.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.83.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.83.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.83.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.83.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.83.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.83.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.83.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.83.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.83.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.83.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.83.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.83.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.83.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.83.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.83.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.83.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.83.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.83.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.83.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.83.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.83.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.83.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.83.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.83.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.83.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.83.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.83.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.83.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.83.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.83.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.83.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.12.14-122.83.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.12.14-122.83.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-0429",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0429"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0429",
          "url": "https://www.suse.com/security/cve/CVE-2020-0429"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176724 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176931 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176931"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188026 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1188026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:18:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0429"
    },
    {
      "cve": "CVE-2020-36386",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36386"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36386",
          "url": "https://www.suse.com/security/cve/CVE-2020-36386"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187038 for CVE-2020-36386",
          "url": "https://bugzilla.suse.com/1187038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192868 for CVE-2020-36386",
          "url": "https://bugzilla.suse.com/1192868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:18:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-36386"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:18:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:18:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_83-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.83.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.83.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.83.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:18:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2021:2695-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2)",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for the Linux Kernel 5.3.18-24_75 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2695,SUSE-SLE-Live-Patching-12-SP4-2021-2749,SUSE-SLE-Live-Patching-12-SP5-2021-2735,SUSE-SLE-Module-Live-Patching-15-2021-2726,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2706,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2695",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2695-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2695-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212695-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2695-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188842",
        "url": "https://bugzilla.suse.com/1188842"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2)",
    "tracking": {
      "current_release_date": "2021-08-17T09:56:24Z",
      "generator": {
        "date": "2021-08-17T09:56:24Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2695-1",
      "initial_release_date": "2021-08-17T09:56:24Z",
      "revision_history": [
        {
          "date": "2021-08-17T09:56:24Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_80-default-2-2.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_80-default-2-2.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-95_80-default-2-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_80-default-2-2.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_80-default-2-2.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_80-default-2-2.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-24_75-preempt-2-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-24_75-preempt-2-2.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-24_75-preempt-2-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15",
                  "product_id": "SUSE Linux Enterprise Live Patching 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_80-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-95_80-default-2-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_80-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_80-default-2-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-17T09:56:24Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-2-2.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-2-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-17T09:56:24Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2021:2687-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2021-3609: Fixed a potential local privilege escalation in the  CAN BCM networking protocol (bsc#1187215).\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw in the joystick devices subsystem. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2021-35039: Fixed mishandling of signature verification. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bsc#1188080).\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: DPTF: Fix reading of attributes (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: PM / fan: Put fan device IDs into separate header file (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: firewire-motu: fix detection for S/PDIF source on optical interface in v2 protocol (git-fixes).\n- ALSA: firewire-motu: fix stream format for MOTU 8pre FireWire (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Apply LED fixup for HP Dragonfly G1, too (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: hda/realtek: Fix pop noise and 2 Front Mic issues on a machine (git-fixes).\n- ALSA: hda/realtek: Improve fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 830 G8 Notebook PC (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook x360 830 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 450 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 630 G8 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: hda: intel-dsp-cfg: add missing ElkhartLake PCI ID (git-fixes).\n- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: pcm - fix mmap capability check for the snd-dummy driver (git-fixes).\n- ALSA: pcm: Call substream ack() method upon compat mmap commit (git-fixes).\n- ALSA: pcm: Fix mmap capability check (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: Add missing proc text entry for BESPOKEN type (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).\n- ALSA: usb-audio: Fix OOB access at proc output (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- ALSA: usx2y: Avoid camelCase (git-fixes).\n- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).\n- ASoC: Intel: sof_sdw: add SOF_RT715_DAI_ID_FIX for AlderLake (git-fixes).\n- ASoC: Intel: sof_sdw: add mutual exclusion between PCH DMIC and RT715 (git-fixes).\n- ASoC: SOF: loader: Use snd_sof_dsp_block_read() instead sof_block_read() (git-fixes).\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: fsl_spdif: Fix error handler with pm_runtime_enable (git-fixes).\n- ASoC: fsl_spdif: Fix unexpected interrupt after suspend (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).\n- ASoC: intel/boards: add missing MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: max98373-sdw: add missing memory allocation check (git-fixes).\n- ASoC: max98373-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rk3328: fix missing clk_disable_unprepare() on error in rk3328_platform_probe() (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ASoC: rt1308-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).\n- ASoC: rt5682-sdw: set regcache_cache_only false before reading RT5682_DEVICE_ID (git-fixes).\n- ASoC: rt5682-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt5682: Disable irq on shutdown (git-fixes).\n- ASoC: rt5682: Fix a problem with error handling in the io init function of the soundwire (git-fixes).\n- ASoC: rt5682: fix getting the wrong device id when the suspend_stress_test (git-fixes).\n- ASoC: rt700-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt711-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: rt715-sdw: use first_hw_init flag on resume (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: soc-pcm: fix the return value in dpcm_apply_symmetry() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- ASoC: wm_adsp: Correct wm_coeff_tlv_get handling (git-fixes).\n- Bluetooth: Fix alt settings for incoming SCO with transparent coding format (git-fixes).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: L2CAP: Fix invalid access if ECRED Reconfigure fails (git-fixes).\n- Bluetooth: L2CAP: Fix invalid access on ECRED Connection response (git-fixes).\n- Bluetooth: Remove spurious error message (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btintel: Add infrastructure to read controller information (bsc#1188893).\n- Bluetooth: btintel: Check firmware version before download (bsc#1188893).\n- Bluetooth: btintel: Collect tlv based active firmware build info in FW mode (bsc#1188893).\n- Bluetooth: btintel: Consolidate intel_version parsing (bsc#1188893).\n- Bluetooth: btintel: Consolidate intel_version_tlv parsing (bsc#1188893).\n- Bluetooth: btintel: Fix endianness issue for TLV version information (bsc#1188893).\n- Bluetooth: btintel: Fix offset calculation boot address parameter (bsc#1188893).\n- Bluetooth: btintel: Functions to send firmware header / payload (bsc#1188893).\n- Bluetooth: btintel: Move operational checks after version check (bsc#1188893).\n- Bluetooth: btintel: Refactor firmware download function (bsc#1188893).\n- Bluetooth: btintel: Reorganized bootloader mode tlv checks in intel_version_tlv parsing (bsc#1188893).\n- Bluetooth: btintel: Replace zero-length array with flexible-array member (bsc#1188893).\n- Bluetooth: btintel: Skip reading firmware file version while in bootloader mode (bsc#1188893).\n- Bluetooth: btqca: Do not modify firmware contents in-place (git-fixes).\n- Bluetooth: btusb: Add *setup* function for new generation Intel controllers (bsc#1188893).\n- Bluetooth: btusb: Add support USB ALT 3 for WBS (git-fixes).\n- Bluetooth: btusb: Add support for GarfieldPeak controller (bsc#1188893).\n- Bluetooth: btusb: Consolidate code for waiting firmware download (bsc#1188893).\n- Bluetooth: btusb: Define a function to construct firmware filename (bsc#1188893).\n- Bluetooth: btusb: Enable MSFT extension for Intel controllers (bsc#1188893).\n- Bluetooth: btusb: Fix failing to init controllers with operation firmware (bsc#1188893).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: btusb: Helper function to download firmware to Intel adapters (bsc#1188893).\n- Bluetooth: btusb: Map Typhoon peak controller to BTUSB_INTEL_NEWGEN (bsc#1188893).\n- Bluetooth: btusb: Update boot parameter specific to SKU (bsc#1188893).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Bluetooth: btusb: print firmware file name on error loading firmware (bsc#1188893).\n- Bluetooth: hci_intel: drop strange le16_to_cpu() against u8 values (bsc#1188893).\n- Bluetooth: hci_intel: enable on new platform (bsc#1188893).\n- Bluetooth: hci_intel: switch to list_for_each_entry() (bsc#1188893).\n- Bluetooth: hci_qca: fix potential GPF (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- Bluetooth: mgmt: Fix the command returns garbage parameter value (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).\n- KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available (bsc#1188703).\n- KVM: nVMX: Consult only the \u0027basic\u0027 exit reason when routing nested exit (bsc#1188773).\n- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).\n- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: intel-gw: Fix INTx enable (git-fixes).\n- PCI: intel-gw: Fix INTx enable (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).\n- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).\n- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).\n- RDMA/cma: Protect RMW with qp_mutex (git-fixes).\n- RDMA/hns: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/mlx4: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/mlx5: Remove unused parameter udata (jsc#SLE-15176).\n- RDMA/rtrs-clt: Check if the queue_depth has changed during a reconnection (jsc#SLE-15176).\n- RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its stats (jsc#SLE-15176).\n- RDMA/rtrs-clt: Fix memory leak of not-freed sess-\u003estats and stats-\u003epcpu_stats (jsc#SLE-15176).\n- RDMA/rtrs-srv: Fix memory leak of unfreed rtrs_srv_stats object (jsc#SLE-15176).\n- RDMA/rtrs-srv: Fix memory leak when having multiple sessions (jsc#SLE-15176).\n- RDMA/rtrs-srv: Replace atomic_t with percpu_ref for ids_inflight (jsc#SLE-15176).\n- RDMA/rtrs-srv: Set minimal max_send_wr and max_recv_wr (jsc#SLE-15176).\n- RDMA/rtrs: Do not reset hb_missed_max after re-connection (jsc#SLE-15176).\n- RDMA/srp: Fix a recently introduced memory leak (jsc#SLE-15176).\n- Revert \u0027ACPI: resources: Add checks for ACPI IRQ override\u0027 (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027Bluetooth: btintel: Fix endianness issue for TLV version information\u0027 (bsc#1188893).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- Revert \u0027be2net: disable bh with spin_lock in be_process_mcc\u0027 (git-fixes).\n- Revert \u0027drm/i915: Propagate errors on awaiting already signaled fences\u0027 (git-fixes).\n- Revert \u0027drm: add a locked version of drm_is_current_master\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- Revert \u0027iwlwifi: remove wide_cmd_header field\u0027 (bsc#1187495).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1184631).\n- bcache: remove bcache device self-defined readahead (bsc#1184631).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: do not disable an already disabled PCI device (git-fixes).\n- bonding: Add struct bond_ipesc to manage SA (bsc#1176447).\n- bonding: disallow setting nested bonding + ipsec offload (bsc#1176447).\n- bonding: fix build issue (git-fixes).\n- bonding: fix incorrect return value of bond_ipsec_offload_ok() (bsc#1176447).\n- bonding: fix null dereference in bond_ipsec_add_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_add_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_del_sa() (bsc#1176447).\n- bonding: fix suspicious RCU usage in bond_ipsec_offload_ok() (bsc#1176447).\n- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- brcmfmac: Fix a double-free in brcmf_sdio_bus_reset (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- cadence: force nonlinear buffers to be cloned (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188748).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: imx8mq: remove SYS PLL 1/2 clock gates (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: si5341: Update initialization magic (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- coresight: Propagate symlink failure (git-fixes).\n- coresight: core: Fix use of uninitialized pointer (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix IRQ free race during driver unload (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).\n- docs: virt/kvm: close inline string literal (bsc#1188703).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/dc: Fix a missing check bug in dm_dp_mst_detect() (git-fixes).\n- drm/amd/display: Avoid HDCP over-read and corruption (git-fixes).\n- drm/amd/display: Fix DCN 3.01 DSCCLK validation (git-fixes).\n- drm/amd/display: Fix build warnings (git-fixes).\n- drm/amd/display: Fix off-by-one error in DML (git-fixes).\n- drm/amd/display: Release MST resources on switch from MST to SST (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Update scaling settings on modeset (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amd/display: fix HDCP reset sequence on reinitialize (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdgpu: enable sdma0 tmz for Raven/Renoir(V2) (git-fixes).\n- drm/amdgpu: remove unsafe optimization to drop preamble ib (git-fixes).\n- drm/amdgpu: update golden setting for sienna_cichlid (git-fixes).\n- drm/amdgpu: wait for moving fence after pinning (git-fixes).\n- drm/amdkfd: Fix circular lock in nocpsch path (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/amdkfd: fix circular locking on get_wave_state (git-fixes).\n- drm/amdkfd: use allowed domain for vmbo validation (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge/sii8620: fix dependency on extcon (git-fixes).\n- drm/bridge: Fix the stop condition of drm_bridge_chain_pre_enable() (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm/bridge: nwl-dsi: Force a full modeset when crtc_state-\u003eactive is changed to be true (git-fixes).\n- drm/dp_mst: Do not set proposed vcpi directly (git-fixes).\n- drm/gma500: Add the missed drm_gem_object_put() in psb_user_framebuffer_create() (git-fixes).\n- drm/i915/display: Do not zero past infoframes.vsc (git-fixes).\n- drm/i915/gvt: Clear d3_entered on elsp cmd submission (git-fixes).\n- drm/i915/selftests: use vma_lookup() in __igt_mmap() (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm/dpu: Fix sm8250_mdp register length (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/msm: Fix error return code in msm_drm_init() (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/nouveau: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/nouveau: fix dma_address check for CPU/GPU sync (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/panel: nt35510: Do not fail if DSI read fails (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/radeon: Call radeon_suspend_kms() in radeon_pci_shutdown() for Loongson64 (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: cdn-dp: fix sign extension on an int multiply for a u64 result (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/rockchip: lvds: Fix an error handling path (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/scheduler: Fix hang when sched_entity released (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: Fix clock source for VEC PixelValve on BCM2711 (git-fixes).\n- drm/vc4: crtc: Skip the TXP (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/vc4: hdmi: Fix PM reference leak in vc4_hdmi_encoder_pre_crtc_co() (git-fixes).\n- drm/vc4: hdmi: Fix error path of hpd-gpios (git-fixes).\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- drm/vc4: hdmi: Prevent clock unbalance (git-fixes).\n- drm/vc4: txp: Properly set the possible_crtcs mask (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/vmwgfx: Fix cpu updates of coherent multisample surfaces (git-fixes).\n- drm/vmwgfx: Mark a surface gpu-dirty after the SVGA3dCmdDXGenMips command (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- drm: add a locked version of drm_is_current_master (git-fixes).\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm: bridge: add missing word in Analogix help text (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm: rockchip: add missing registers for RK3066 (git-fixes).\n- drm: rockchip: add missing registers for RK3188 (git-fixes).\n- drm: rockchip: set alpha_en to 0 if it is not used (git-fixes).\n- e1000e: Check the PCIm state (git-fixes).\n- e1000e: Fix an error handling path in \u0027e1000_probe()\u0027 (git-fixes).\n- efi/tpm: Differentiate missing and invalid final event log table (bsc#1188036).\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fbmem: Do not delete the mode that is still in use (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).\n- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).\n- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: core: Disable client irq on reboot/shutdown (git-fixes).\n- i2c: designware: Adjust bus_freq_hz when refuse high speed mode set (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).\n- i40e: Fix error handling in i40e_vsi_open (git-fixes).\n- i40e: Fix missing rtnl locking when setting up pf switch (jsc#SLE-13701).\n- i40e: fix PTP on 5Gb links (jsc#SLE-13701).\n- iavf: Fix an error handling path in \u0027iavf_probe()\u0027 (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).\n- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).\n- igb: Fix an error handling path in \u0027igb_probe()\u0027 (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igb: Fix use-after-free error during reset (git-fixes).\n- igc: Fix an error handling path in \u0027igc_probe()\u0027 (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- integrity: use arch_ima_get_secureboot instead of checking EFI_SECURE_BOOT when loading MokListRT (bsc#1188366).\n- intel_th: Wait until port is in reset before programming it (git-fixes).\n- iwl-trans: move dev_cmd_offs, page_offs to a common trans header (bsc#1187495).\n- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_enqueue_hcmd() (git-fixes).\n- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_gen2_enqueue_hcmd() (git-fixes).\n- iwlwifi: acpi: evaluate dsm to disable 5.8GHz channels (bsc#1187495).\n- iwlwifi: acpi: in non acpi compilations remove iwl_sar_geo_init (bsc#1187495).\n- iwlwifi: acpi: prepare SAR profile selection code for multiple sizes (bsc#1187495).\n- iwlwifi: acpi: remove dummy definition of iwl_sar_set_profile() (bsc#1187495).\n- iwlwifi: acpi: rename geo structs to contain versioning (bsc#1187495).\n- iwlwifi: acpi: support ppag table command v2 (bsc#1187495).\n- iwlwifi: add a common struct for all iwl_tx_power_cmd versions (bsc#1187495).\n- iwlwifi: add trans op to set PNVM (bsc#1187495).\n- iwlwifi: align RX status flags with firmware (bsc#1187495).\n- iwlwifi: api: fix u32 -\u003e __le32 (bsc#1187495).\n- iwlwifi: bump FW API to 57 for AX devices (bsc#1187495).\n- iwlwifi: bump FW API to 59 for AX devices (bsc#1187495).\n- iwlwifi: calib: Demote seemingly unintentional kerneldoc header (bsc#1187495).\n- iwlwifi: dbg: Do not touch the tlv data (bsc#1187495).\n- iwlwifi: dbg: add debug host notification (DHN) time point (bsc#1187495).\n- iwlwifi: dbg: add dumping special device memory (bsc#1187495).\n- iwlwifi: dbg: remove IWL_FW_INI_TIME_POINT_WDG_TIMEOUT (bsc#1187495).\n- iwlwifi: do not export acpi functions unnecessarily (bsc#1187495).\n- iwlwifi: dvm: Demote a couple of nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: devices: Fix function documentation formatting issues (bsc#1187495).\n- iwlwifi: dvm: lib: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: rxon: Demote non-conformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: scan: Demote a few nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: sta: Demote a bunch of nonconformant kernel-doc headers (bsc#1187495).\n- iwlwifi: dvm: tx: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: enable twt by default (bsc#1187495).\n- iwlwifi: fix 11ax disabled bit in the regulatory capability flags (bsc#1187495).\n- iwlwifi: fix sar geo table initialization (bsc#1187495).\n- iwlwifi: fw: add default value for iwl_fw_lookup_cmd_ver (bsc#1187495).\n- iwlwifi: fw: move assert descriptor parser to common code (bsc#1187495).\n- iwlwifi: increase PNVM load timeout (bsc#1187495).\n- iwlwifi: iwl-drv: Provide descriptions debugfs dentries (bsc#1187495).\n- iwlwifi: iwl-trans: move tfd to trans layer (bsc#1187495).\n- iwlwifi: move PNVM implementation to common code (bsc#1187495).\n- iwlwifi: move all bus-independent TX functions to common code (bsc#1187495).\n- iwlwifi: move bc_pool to a common trans header (bsc#1187495).\n- iwlwifi: move bc_table_dword to a common trans header (bsc#1187495).\n- iwlwifi: msix: limit max RX queues for 9000 family (bsc#1187495).\n- iwlwifi: mvm: Add FTM initiator RTT smoothing logic (bsc#1187495).\n- iwlwifi: mvm: Do not install CMAC/GMAC key in AP mode (bsc#1187495).\n- iwlwifi: mvm: add PROTECTED_TWT firmware API (bsc#1187495).\n- iwlwifi: mvm: add a get lmac id function (bsc#1187495).\n- iwlwifi: mvm: add an option to add PASN station (bsc#1187495).\n- iwlwifi: mvm: add d3 prints (bsc#1187495).\n- iwlwifi: mvm: add support for new WOWLAN_TSC_RSC_PARAM version (bsc#1187495).\n- iwlwifi: mvm: add support for new version of WOWLAN_TKIP_SETTING_API_S (bsc#1187495).\n- iwlwifi: mvm: add support for range request command ver 11 (bsc#1187495).\n- iwlwifi: mvm: add support for responder dynamic config command version 3 (bsc#1187495).\n- iwlwifi: mvm: assign SAR table revision to the command later (bsc#1187495).\n- iwlwifi: mvm: avoid possible NULL pointer dereference (bsc#1187495).\n- iwlwifi: mvm: clear all scan UIDs (bsc#1187495).\n- iwlwifi: mvm: d3: parse wowlan status version 11 (bsc#1187495).\n- iwlwifi: mvm: d3: support GCMP ciphers (bsc#1187495).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: mvm: do not check if CSA event is running before removing (bsc#1187495).\n- iwlwifi: mvm: do not send a CSA command the firmware does not know (bsc#1187495).\n- iwlwifi: mvm: fix error print when session protection ends (git-fixes).\n- iwlwifi: mvm: fix suspicious rcu usage warnings (bsc#1187495).\n- iwlwifi: mvm: fix the type we use in the PPAG table validity checks (bsc#1187495).\n- iwlwifi: mvm: get number of stations from TLV (bsc#1187495).\n- iwlwifi: mvm: ignore the scan duration parameter (bsc#1187495).\n- iwlwifi: mvm: initiator: add option for adding a PASN responder (bsc#1187495).\n- iwlwifi: mvm: location: set the HLTK when PASN station is added (bsc#1187495).\n- iwlwifi: mvm: ops: Remove unused static struct \u0027iwl_mvm_debug_names\u0027 (bsc#1187495).\n- iwlwifi: mvm: prepare roc_done_wk to work sync (bsc#1187495).\n- iwlwifi: mvm: process ba-notifications also when sta rcu is invalid (bsc#1187495).\n- iwlwifi: mvm: re-enable TX after channel switch (bsc#1187495).\n- iwlwifi: mvm: read and parse SKU ID if available (bsc#1187495).\n- iwlwifi: mvm: remove memset of kek_kck command (bsc#1187495).\n- iwlwifi: mvm: remove redundant log in iwl_mvm_tvqm_enable_txq() (bsc#1187495).\n- iwlwifi: mvm: remove redundant support_umac_log field (bsc#1187495).\n- iwlwifi: mvm: responder: allow to set only the HLTK for an associated station (bsc#1187495).\n- iwlwifi: mvm: ring the doorbell and wait for PNVM load completion (bsc#1187495).\n- iwlwifi: mvm: rs-fw: handle VHT extended NSS capability (bsc#1187495).\n- iwlwifi: mvm: send stored PPAG command instead of local (bsc#1187495).\n- iwlwifi: mvm: set PROTECTED_TWT feature if supported by firmware (bsc#1187495).\n- iwlwifi: mvm: set PROTECTED_TWT in MAC data policy (bsc#1187495).\n- iwlwifi: mvm: set enabled in the PPAG command properly (bsc#1187495).\n- iwlwifi: mvm: stop claiming NL80211_EXT_FEATURE_SET_SCAN_DWELL (bsc#1187495).\n- iwlwifi: mvm: store PPAG enabled/disabled flag properly (bsc#1187495).\n- iwlwifi: mvm: support ADD_STA_CMD_API_S ver 12 (bsc#1187495).\n- iwlwifi: mvm: support more GTK rekeying algorithms (bsc#1187495).\n- iwlwifi: mvm: support new KEK KCK api (bsc#1187495).\n- iwlwifi: mvm: tx: Demote misuse of kernel-doc headers (bsc#1187495).\n- iwlwifi: mvm: use CHECKSUM_COMPLETE (bsc#1187495).\n- iwlwifi: mvm: utils: Fix some doc-rot (bsc#1187495).\n- iwlwifi: pcie: avoid potential PNVM leaks (bsc#1187495).\n- iwlwifi: pcie: do not disable interrupts for reg_lock (bsc#1187495).\n- iwlwifi: pcie: fix context info freeing (git-fixes).\n- iwlwifi: pcie: fix the xtal latency value for a few qu devices (bsc#1187495).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- iwlwifi: pcie: implement set_pnvm op (bsc#1187495).\n- iwlwifi: pcie: make iwl_pcie_txq_update_byte_cnt_tbl bus independent (bsc#1187495).\n- iwlwifi: pcie: properly set LTR workarounds on 22000 devices (bsc#1187495).\n- iwlwifi: phy-ctxt: add new API VER 3 for phy context cmd (bsc#1187495).\n- iwlwifi: pnvm: do not skip everything when not reloading (bsc#1187495).\n- iwlwifi: pnvm: do not try to load after failures (bsc#1187495).\n- iwlwifi: pnvm: increment the pointer before checking the TLV (bsc#1187495).\n- iwlwifi: pnvm: set the PNVM again if it was already loaded (bsc#1187495).\n- iwlwifi: provide gso_type to GSO packets (bsc#1187495).\n- iwlwifi: queue: bail out on invalid freeing (bsc#1187495).\n- iwlwifi: read and parse PNVM file (bsc#1187495).\n- iwlwifi: regulatory: regulatory capabilities api change (bsc#1187495).\n- iwlwifi: remove iwl_validate_sar_geo_profile() export (bsc#1187495).\n- iwlwifi: remove wide_cmd_header field (bsc#1187495).\n- iwlwifi: rs: Demote non-compliant kernel-doc headers (bsc#1187495).\n- iwlwifi: rs: align to new TLC config command API (bsc#1187495).\n- iwlwifi: rs: set RTS protection for all non legacy rates (bsc#1187495).\n- iwlwifi: sta: defer ADDBA transmit in case reclaimed SN != next SN (bsc#1187495).\n- iwlwifi: stats: add new api fields for statistics cmd/ntfy (bsc#1187495).\n- iwlwifi: support REDUCE_TX_POWER_CMD version 6 (bsc#1187495).\n- iwlwifi: support version 3 of GEO_TX_POWER_LIMIT (bsc#1187495).\n- iwlwifi: support version 5 of the alive notification (bsc#1187495).\n- iwlwifi: thermal: support new temperature measurement API (bsc#1187495).\n- iwlwifi: update prph scratch structure to include PNVM data (bsc#1187495).\n- iwlwifi: use correct group for alive notification (bsc#1187495).\n- iwlwifi: wowlan: adapt to wowlan status API version 10 (bsc#1187495).\n- iwlwifi: yoyo: add support for internal buffer allocation in D3 (bsc#1187495).\n- ixgbe: Fix an error handling path in \u0027ixgbe_probe()\u0027 (git-fixes).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- ixgbevf: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).\n- kABI compatibility fix for max98373_priv struct (git-fixes).\n- kABI workaround for btintel symbol changes (bsc#1188893).\n- kABI workaround for intel_th_driver (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kabi/severities: ignore kABI of iwlwifi symbols (bsc#1187495) iwlwifi driver consists of several modules and all exported symbols are internal uses. Let\u0027s ignore kABI checks of those.\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).\n- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: class: The -ENOTSUPP should never be seen by user space (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- mac80211: consider per-CPU statistics if present (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- mac80211: reset profile_periodicity/ema_ap (git-fixes).\n- mac80211_hwsim: add concurrent channels scanning support over virtio (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).\n- misc: alcor_pci: fix inverted branch condition (git-fixes).\n- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mt76: mt7603: set 0 as min coverage_class value (git-fixes).\n- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).\n- mt76: mt7615: fix fixed-rate tx status reporting (git-fixes).\n- mt76: mt7615: increase MCU command timeout (git-fixes).\n- mt76: mt7915: fix IEEE80211_HE_PHY_CAP7_MAX_NC for station mode (git-fixes).\n- mt76: set dma-done flag for flushed descriptors (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mvpp2: suppress warning (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).\n- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).\n- net/sched: act_ct: remove and free nf_table callbacks (jsc#SLE-15172).\n- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).\n- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).\n- net: fec_ptp: fix issue caused by refactor the fec_devtype (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: ipw2x00,iwlegacy,iwlwifi: Remove in_interrupt() from debug macros (bsc#1187495).\n- net: iwlwifi: Remove in_interrupt() from tracing macro (bsc#1187495).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mvpp2: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- net: netdevsim: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).\n- net: phy: fix save wrong speed and duplex problem if autoneg is on (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: phy: realtek: add delay to fix RXC generation issue (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).\n- netfilter: ctnetlink: suspicious RCU usage in ctnetlink_dump_helpinfo (bsc#1176447).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).\n- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- powerpc/stacktrace: Fix spurious \u0027stale\u0027 traces in raise_backtrace_ipi() (bsc#1156395).\n- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).\n- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).\n- prctl: PR_{G,S}ET_IO_FLUSHER to support controlling memory reclaim (bsc#1188752).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).\n- pwm: imx1: Do not disable clocks at device remove time (git-fixes).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).\n- r8152: Fix potential PM refcount imbalance (bsc#1186194).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).\n- rbd: always kick acquire on \u0027acquired\u0027 and \u0027released\u0027 notifications (bsc#1188746).\n- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi6421: Fix getting wrong drvdata (git-fixes).\n- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- replaced with upstream security mitigation cleanup\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- rtw88: 8822c: fix lc calibration timing (git-fixes).\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- scsi: ibmvfc: Fix command state accounting and stale response detection (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial: 8250_pci: Add support for new HPE serial device (git-fixes).\n- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).\n- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- sfp: Fix error handing in sfp_probe() (git-fixes).\n- skbuff: Fix build with SKB extensions disabled (jsc#SLE-15172).\n- skbuff: Release nfct refcount on napi stolen or re-used skbs (jsc#SLE-15172).\n- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: cadence: Correct initialisation of runtime PM again (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).\n- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).\n- thermal/drivers/int340x/processor_thermal: Fix tcc setting (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- thunderbolt: Bond lanes only when dual_link_port != NULL in alloc_dev_default() (git-fixes).\n- timers: Fix get_next_timer_interrupt() with no timers pending (git-fixes)\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify \u0026 fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).\n- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(\u0026port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: update power supply once partner accepts (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).\n- wireless: carl9170: fix LEDS build errors \u0026 warnings (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- xen/events: reset active flag for lateeoi events later (git-fixes).\n- xfrm: Fix xfrm offload fallback fail case (bsc#1176447).\n- xfrm: delete xfrm4_output_finish xfrm6_output_finish declarations (bsc#1176447).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n- xsk: Fix missing validation for skb and unaligned mode (jsc#SLE-13706).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2687,SUSE-SLE-Module-Basesystem-15-SP3-2021-2687,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2687,SUSE-SLE-Module-Legacy-15-SP3-2021-2687,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2687,SUSE-SLE-Product-HA-15-SP3-2021-2687,SUSE-SLE-Product-WE-15-SP3-2021-2687",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2687-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2687-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212687-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2687-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152472",
        "url": "https://bugzilla.suse.com/1152472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153274",
        "url": "https://bugzilla.suse.com/1153274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155518",
        "url": "https://bugzilla.suse.com/1155518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170511",
        "url": "https://bugzilla.suse.com/1170511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176447",
        "url": "https://bugzilla.suse.com/1176447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179243",
        "url": "https://bugzilla.suse.com/1179243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180092",
        "url": "https://bugzilla.suse.com/1180092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180814",
        "url": "https://bugzilla.suse.com/1180814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184631",
        "url": "https://bugzilla.suse.com/1184631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185308",
        "url": "https://bugzilla.suse.com/1185308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185791",
        "url": "https://bugzilla.suse.com/1185791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186194",
        "url": "https://bugzilla.suse.com/1186194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186206",
        "url": "https://bugzilla.suse.com/1186206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186483",
        "url": "https://bugzilla.suse.com/1186483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187215",
        "url": "https://bugzilla.suse.com/1187215"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187495",
        "url": "https://bugzilla.suse.com/1187495"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187585",
        "url": "https://bugzilla.suse.com/1187585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188036",
        "url": "https://bugzilla.suse.com/1188036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188080",
        "url": "https://bugzilla.suse.com/1188080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188121",
        "url": "https://bugzilla.suse.com/1188121"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188126",
        "url": "https://bugzilla.suse.com/1188126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188176",
        "url": "https://bugzilla.suse.com/1188176"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188267",
        "url": "https://bugzilla.suse.com/1188267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188268",
        "url": "https://bugzilla.suse.com/1188268"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188269",
        "url": "https://bugzilla.suse.com/1188269"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188323",
        "url": "https://bugzilla.suse.com/1188323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188366",
        "url": "https://bugzilla.suse.com/1188366"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188445",
        "url": "https://bugzilla.suse.com/1188445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188504",
        "url": "https://bugzilla.suse.com/1188504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188683",
        "url": "https://bugzilla.suse.com/1188683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188703",
        "url": "https://bugzilla.suse.com/1188703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188720",
        "url": "https://bugzilla.suse.com/1188720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188746",
        "url": "https://bugzilla.suse.com/1188746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188747",
        "url": "https://bugzilla.suse.com/1188747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188748",
        "url": "https://bugzilla.suse.com/1188748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188752",
        "url": "https://bugzilla.suse.com/1188752"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188770",
        "url": "https://bugzilla.suse.com/1188770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188771",
        "url": "https://bugzilla.suse.com/1188771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188772",
        "url": "https://bugzilla.suse.com/1188772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188773",
        "url": "https://bugzilla.suse.com/1188773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188774",
        "url": "https://bugzilla.suse.com/1188774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188777",
        "url": "https://bugzilla.suse.com/1188777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188893",
        "url": "https://bugzilla.suse.com/1188893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-21781 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-21781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35039 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3609 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3612 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3612/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-14T08:17:13Z",
      "generator": {
        "date": "2021-08-14T08:17:13Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2687-1",
      "initial_release_date": "2021-08-14T08:17:13Z",
      "revision_history": [
        {
          "date": "2021-08-14T08:17:13Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "cluster-md-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "cluster-md-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dlm-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "dlm-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "dlm-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dlm-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "dlm-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-al-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-al-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-al-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-allwinner-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-allwinner-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-allwinner-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-altera-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-altera-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-altera-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amd-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-amd-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-amd-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amlogic-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-amlogic-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-amlogic-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-apm-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-apm-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-apm-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-arm-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-arm-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-arm-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-broadcom-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-broadcom-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-broadcom-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-cavium-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-cavium-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-cavium-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-exynos-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-exynos-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-exynos-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-freescale-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-freescale-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-freescale-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-hisilicon-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-hisilicon-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-hisilicon-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-lg-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-lg-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-lg-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-marvell-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-marvell-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-marvell-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-mediatek-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-mediatek-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-mediatek-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-nvidia-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-nvidia-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-nvidia-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-qcom-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-qcom-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-qcom-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-renesas-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-renesas-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-renesas-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-rockchip-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-rockchip-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-rockchip-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-socionext-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-socionext-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-socionext-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-sprd-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-sprd-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-sprd-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-xilinx-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-xilinx-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-xilinx-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-zte-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "dtb-zte-5.3.18-59.19.1.aarch64",
                  "product_id": "dtb-zte-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "gfs2-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "gfs2-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "gfs2-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-extra-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-extra-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-extra-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-livepatch-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-optional-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-64kb-optional-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-64kb-optional-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
                "product": {
                  "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
                  "product_id": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-extra-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-livepatch-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-default-optional-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-default-optional-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-obs-build-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-obs-qa-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-extra-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-extra-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-extra-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-optional-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-preempt-optional-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-preempt-optional-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kernel-syms-5.3.18-59.19.1.aarch64",
                  "product_id": "kernel-syms-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "kselftests-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "kselftests-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "kselftests-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "ocfs2-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "ocfs2-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64",
                  "product_id": "reiserfs-kmp-64kb-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
                  "product_id": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64",
                  "product_id": "reiserfs-kmp-preempt-5.3.18-59.19.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-devel-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-devel-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-docs-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-docs-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-docs-html-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-docs-html-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-macros-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-macros-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-source-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-source-5.3.18-59.19.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.3.18-59.19.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-5.3.18-59.19.1.noarch",
                  "product_id": "kernel-source-vanilla-5.3.18-59.19.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "dlm-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-debug-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-debug-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-debug-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
                  "product_id": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le",
                  "product_id": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-extra-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-default-optional-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-default-optional-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-kvmsmall-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-obs-build-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-obs-qa-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kernel-syms-5.3.18-59.19.1.ppc64le",
                  "product_id": "kernel-syms-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "kselftests-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
                  "product_id": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "cluster-md-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "dlm-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "gfs2-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
                "product": {
                  "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
                  "product_id": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x",
                  "product_id": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-devel-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-devel-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-extra-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-extra-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-livepatch-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-default-optional-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-default-optional-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-obs-build-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-obs-build-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-obs-qa-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-syms-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-syms-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-5.3.18-59.19.1.s390x",
                  "product_id": "kernel-zfcpdump-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "kselftests-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "ocfs2-kmp-default-5.3.18-59.19.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-59.19.1.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-59.19.1.s390x",
                  "product_id": "reiserfs-kmp-default-5.3.18-59.19.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "cluster-md-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "dlm-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "dlm-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "dlm-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "gfs2-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "gfs2-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-debug-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-debug-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-debug-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
                "product": {
                  "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
                  "product_id": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-extra-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-livepatch-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-default-optional-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-default-optional-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-kvmsmall-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-59_19-preempt-1-7.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-59_19-preempt-1-7.3.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-59_19-preempt-1-7.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-obs-build-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-obs-qa-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-extra-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-extra-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-extra-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-livepatch-devel-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-optional-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-preempt-optional-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-preempt-optional-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kernel-syms-5.3.18-59.19.1.x86_64",
                  "product_id": "kernel-syms-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "kselftests-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "kselftests-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "ocfs2-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
                  "product_id": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64",
                  "product_id": "reiserfs-kmp-preempt-5.3.18-59.19.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-64kb-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-devel-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-64kb-devel-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64"
        },
        "product_reference": "kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le"
        },
        "product_reference": "kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x"
        },
        "product_reference": "kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-default-devel-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-devel-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-59.19.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-59.19.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-preempt-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-zfcpdump-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-59.19.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-obs-build-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-obs-build-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-59.19.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-59.19.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "kernel-syms-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-syms-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "dlm-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-59.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-59.19.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-default-extra-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-extra-5.3.18-59.19.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
        },
        "product_reference": "kernel-preempt-extra-5.3.18-59.19.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-21781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-21781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process\u0027s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-21781",
          "url": "https://www.suse.com/security/cve/CVE-2021-21781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188445 for CVE-2021-21781",
          "url": "https://bugzilla.suse.com/1188445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:17:13Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-21781"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:17:13Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-35039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35039",
          "url": "https://www.suse.com/security/cve/CVE-2021-35039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188080 for CVE-2021-35039",
          "url": "https://bugzilla.suse.com/1188080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188126 for CVE-2021-35039",
          "url": "https://bugzilla.suse.com/1188126"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:17:13Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-35039"
    },
    {
      "cve": "CVE-2021-3609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3609",
          "url": "https://www.suse.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187215 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1187215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188323 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188720 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1196810"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:17:13Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3609"
    },
    {
      "cve": "CVE-2021-3612",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3612"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3612",
          "url": "https://www.suse.com/security/cve/CVE-2021-3612"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187585 for CVE-2021-3612",
          "url": "https://bugzilla.suse.com/1187585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:17:13Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3612"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:17:13Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-1-7.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.19.1.18.10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.19.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.19.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.19.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-14T08:17:13Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2021:2643-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. (bsc#1176724).\n- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bsc#1187038).\n- CVE-2021-22543: Fixed an improper handling of VM_IO|VM_PFNMAP vmas in KVM that allows users to start and control a VM to read/write random pages of memory and can result in local privilege escalation. (bnc#1186482)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027USB: cdc-acm: fix rounding error in TIOCSSERIAL\u0027 (git-fixes).\n- Revert \u0027hwmon: (lm80) fix a missing check of bus read in lm80 probe\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- USB: move many drivers to use DEVICE_ATTR_WO (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- arm64/mm: Fix ttbr0 values stored in struct thread_info for software-pan (git-fixes).\n- arm_pmu: Fix write counter incorrect in ARMv7 big-endian mode (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).\n- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).\n- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188750).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-\u003eprepath (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- cosa: Add missing kfree in error path of cosa_write (git-fixes).\n- crypto: cavium/nitrox - Fix an error rhandling path in \u0027nitrox_probe()\u0027 (git-fixes).\n- crypto: do not free algorithm before using (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix wrong shift (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- e100: handle eeprom as little endian (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188273).\n- fuse: reject internal errno (bsc#1188274).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)\n- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add NULL pointer checks when freeing irqs (bsc#1176940).\n- gve: Add basic driver framework for Compute Engine Virtual NIC (jsc#SLE-10538).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add ethtool support (jsc#SLE-10538).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Add workqueue and reset support (jsc#SLE-10538).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: Copy and paste bug in gve_get_stats() (jsc#SLE-10538).\n- gve: Correct SKB queue index validation (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (bsc#1176940).\n- gve: Fix case where desc_cnt and data_cnt can get out of sync (jsc#SLE-10538).\n- gve: Fix error return code in gve_alloc_qpls() (jsc#SLE-10538).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- gve: Fix the queue page list allocated pages count (bsc#1176940).\n- gve: Fix u64_stats_sync to initialize start (jsc#SLE-10538).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Fixes DMA synchronization (jsc#SLE-10538).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Remove the exporting of gve_probe (jsc#SLE-10538).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Update mgmt_msix_idx if num_ntfy changes (bsc#1176940).\n- gve: Upgrade memory barrier in poll routine (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: fix -ENOMEM null check on a page allocation (jsc#SLE-10538).\n- gve: fix dma sync bug where not all pages synced (bsc#1176940).\n- gve: fix unused variable/label warnings (jsc#SLE-10538).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- gve: replace kfree with kvfree (jsc#SLE-10538).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- kabi: fix nvme_wait_freeze_timeout() return type (bsc#1181161).\n- kfifo: DECLARE_KIFO_PTR(fifo, u64) does not work on arm 32 bit (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#1185032).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).\n- net/mlx5: Query PPS pin operational status before registering it (git-fixes).\n- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).\n- net: Google gve: Remove dma_wmb() before ringing doorbell (bsc#1176940).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: broadcom CNIC: requires MMU (git-fixes).\n- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- netsec: restore phy power state after controller reset (git-fixes).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1181161).\n- nvme-multipath: fix double initialization of ANA state (bsc#1181161).\n- nvme-rdma: add clean action for failed reconnection (bsc#1181161).\n- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1181161).\n- nvme-rdma: use cancel tagset helper for tear down (bsc#1181161).\n- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1181161).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- nvmet: use new ana_log_size instead the old one (bsc#1181161).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries/scm: Use a specific endian format for storing uuid from the device tree (bsc#1113295, git-fixes).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- sched/cpufreq/schedutil: Fix error path mutex unlock (git-fixes)\n- sched/fair: Do not assign runtime for throttled cfs_rq (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- sched/numa: Fix a possible divide-by-zero (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- scsi: mpt3sas: Fix kernel panic observed on soft HBA unplug (bsc#1185995).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195).\n- serial: mvebu-uart: clarify the baud rate derivation (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (git-fixes).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: move many drivers to use DEVICE_ATTR_WO (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: vudc synchronize sysfs code paths (git-fixes).\n- usbip: vudc: fix missing unlock on error in usbip_sockfd_store() (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- xen-pciback: reconfigure also from backend watch handler (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-2643,SUSE-SLE-RT-12-SP5-2021-2643",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2643-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:2643-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212643-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:2643-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153720",
        "url": "https://bugzilla.suse.com/1153720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170511",
        "url": "https://bugzilla.suse.com/1170511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176724",
        "url": "https://bugzilla.suse.com/1176724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176931",
        "url": "https://bugzilla.suse.com/1176931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176940",
        "url": "https://bugzilla.suse.com/1176940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179195",
        "url": "https://bugzilla.suse.com/1179195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181161",
        "url": "https://bugzilla.suse.com/1181161"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183871",
        "url": "https://bugzilla.suse.com/1183871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184804",
        "url": "https://bugzilla.suse.com/1184804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185032",
        "url": "https://bugzilla.suse.com/1185032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185308",
        "url": "https://bugzilla.suse.com/1185308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185791",
        "url": "https://bugzilla.suse.com/1185791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185995",
        "url": "https://bugzilla.suse.com/1185995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186206",
        "url": "https://bugzilla.suse.com/1186206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186672",
        "url": "https://bugzilla.suse.com/1186672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187038",
        "url": "https://bugzilla.suse.com/1187038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187050",
        "url": "https://bugzilla.suse.com/1187050"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187215",
        "url": "https://bugzilla.suse.com/1187215"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187476",
        "url": "https://bugzilla.suse.com/1187476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187585",
        "url": "https://bugzilla.suse.com/1187585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187846",
        "url": "https://bugzilla.suse.com/1187846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188026",
        "url": "https://bugzilla.suse.com/1188026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188062",
        "url": "https://bugzilla.suse.com/1188062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188101",
        "url": "https://bugzilla.suse.com/1188101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188116",
        "url": "https://bugzilla.suse.com/1188116"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188273",
        "url": "https://bugzilla.suse.com/1188273"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188274",
        "url": "https://bugzilla.suse.com/1188274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188405",
        "url": "https://bugzilla.suse.com/1188405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188620",
        "url": "https://bugzilla.suse.com/1188620"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188750",
        "url": "https://bugzilla.suse.com/1188750"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188838",
        "url": "https://bugzilla.suse.com/1188838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188842",
        "url": "https://bugzilla.suse.com/1188842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188876",
        "url": "https://bugzilla.suse.com/1188876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188973",
        "url": "https://bugzilla.suse.com/1188973"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0429 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0429/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36385 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36385/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36386 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36386/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22555 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22555/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33909 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33909/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3609 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3612 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3612/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3659 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-08-10T08:03:06Z",
      "generator": {
        "date": "2021-08-10T08:03:06Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:2643-1",
      "initial_release_date": "2021-08-10T08:03:06Z",
      "revision_history": [
        {
          "date": "2021-08-10T08:03:06Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-4.12.14-10.54.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-4.12.14-10.54.1.noarch",
                  "product_id": "kernel-devel-rt-4.12.14-10.54.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-4.12.14-10.54.1.noarch",
                "product": {
                  "name": "kernel-source-rt-4.12.14-10.54.1.noarch",
                  "product_id": "kernel-source-rt-4.12.14-10.54.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                  "product_id": "cluster-md-kmp-rt_debug-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-4.12.14-10.54.1.x86_64",
                  "product_id": "dlm-kmp-rt-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                  "product_id": "dlm-kmp-rt_debug-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
                  "product_id": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                  "product_id": "gfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-base-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt-base-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt-base-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt-devel-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt-extra-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kgraft-devel-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt-kgraft-devel-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt-kgraft-devel-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt_debug-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-base-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-base-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt_debug-base-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-extra-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-extra-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt_debug-extra-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-4.12.14-10.54.1.x86_64",
                  "product_id": "kernel-syms-rt-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-4.12.14-10.54.1.x86_64",
                  "product_id": "kselftests-kmp-rt-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                  "product_id": "kselftests-kmp-rt_debug-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
                  "product_id": "ocfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Real Time 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Real Time 12 SP5",
                  "product_id": "SUSE Linux Enterprise Real Time 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-4.12.14-10.54.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch"
        },
        "product_reference": "kernel-devel-rt-4.12.14-10.54.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "kernel-rt-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-base-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "kernel-rt-base-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-4.12.14-10.54.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch"
        },
        "product_reference": "kernel-source-rt-4.12.14-10.54.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-0429",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0429"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0429",
          "url": "https://www.suse.com/security/cve/CVE-2020-0429"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176724 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176931 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1176931"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188026 for CVE-2020-0429",
          "url": "https://bugzilla.suse.com/1188026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0429"
    },
    {
      "cve": "CVE-2020-36385",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36385"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36385",
          "url": "https://www.suse.com/security/cve/CVE-2020-36385"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187050 for CVE-2020-36385",
          "url": "https://bugzilla.suse.com/1187050"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187052 for CVE-2020-36385",
          "url": "https://bugzilla.suse.com/1187052"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189302 for CVE-2020-36385",
          "url": "https://bugzilla.suse.com/1189302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196174 for CVE-2020-36385",
          "url": "https://bugzilla.suse.com/1196174"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2020-36385",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2020-36385",
          "url": "https://bugzilla.suse.com/1196914"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200084 for CVE-2020-36385",
          "url": "https://bugzilla.suse.com/1200084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201734 for CVE-2020-36385",
          "url": "https://bugzilla.suse.com/1201734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-36385"
    },
    {
      "cve": "CVE-2020-36386",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36386"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36386",
          "url": "https://www.suse.com/security/cve/CVE-2020-36386"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187038 for CVE-2020-36386",
          "url": "https://bugzilla.suse.com/1187038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192868 for CVE-2020-36386",
          "url": "https://bugzilla.suse.com/1192868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-36386"
    },
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-22555",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22555"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22555",
          "url": "https://www.suse.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188116 for CVE-2021-22555",
          "url": "https://bugzilla.suse.com/1188116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188117 for CVE-2021-22555",
          "url": "https://bugzilla.suse.com/1188117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188411 for CVE-2021-22555",
          "url": "https://bugzilla.suse.com/1188411"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22555"
    },
    {
      "cve": "CVE-2021-33909",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33909"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33909",
          "url": "https://www.suse.com/security/cve/CVE-2021-33909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188062 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188063 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188063"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188257 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189302 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1189302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190859 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1190859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-3609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3609",
          "url": "https://www.suse.com/security/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187215 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1187215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188323 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188720 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1188720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3609",
          "url": "https://bugzilla.suse.com/1196810"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3609"
    },
    {
      "cve": "CVE-2021-3612",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3612"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3612",
          "url": "https://www.suse.com/security/cve/CVE-2021-3612"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187585 for CVE-2021-3612",
          "url": "https://bugzilla.suse.com/1187585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3612"
    },
    {
      "cve": "CVE-2021-3659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3659",
          "url": "https://www.suse.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188876 for CVE-2021-3659",
          "url": "https://bugzilla.suse.com/1188876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3659"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-10T08:03:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    }
  ]
}
  suse-su-2025:0834-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM (bsc#1186482).\n- CVE-2021-47634: ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl (bsc#1237758).\n- CVE-2021-47644: media: staging: media: zoran: move videodev alloc (bsc#1237766).\n- CVE-2022-48953: rtc: cmos: fix build on non-ACPI platforms (bsc#1231941).\n- CVE-2022-48975: gpiolib: fix memory leak in gpiochip_setup_dev() (bsc#1231885).\n- CVE-2022-49006: tracing: Free buffers when a used dynamic event is removed (bsc#1232163).\n- CVE-2022-49076: RDMA/hfi1: Fix use-after-free bug for mm struct (bsc#1237738).\n- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).\n- CVE-2022-49089: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (bsc#1238041).\n- CVE-2022-49124: x86/mce: Work around an erratum on fast string copy instructions (bsc#1238148).\n- CVE-2022-49134: mlxsw: spectrum: Guard against invalid local ports (bsc#1237982).\n- CVE-2022-49135: drm/amd/display: Fix memory leak (bsc#1238006).\n- CVE-2022-49151: can: mcba_usb: properly check endpoint type (bsc#1237778).\n- CVE-2022-49178: memstick/mspro_block: fix handling of read-only devices (bsc#1238107).\n- CVE-2022-49182: net: hns3: add vlan list lock to protect vlan list (bsc#1238260).\n- CVE-2022-49201: ibmvnic: fix race between xmit and reset (bsc#1238256).\n- CVE-2022-49247: media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (bsc#1237783).\n- CVE-2022-49490: drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is (bsc#1238275).\n- CVE-2022-49626: sfc: fix use after free when disabling sriov (bsc#1238270).\n- CVE-2022-49661: can: gs_usb: gs_usb_open/close(): fix memory leak (bsc#1237788).\n- CVE-2023-52572: Fixed UAF in cifs_demultiplex_thread() in cifs (bsc#1220946).\n- CVE-2023-52853: hid: cp2112: Fix duplicate workqueue initialization (bsc#1224988).\n- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).\n- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).\n- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).\n- CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095).\n- CVE-2024-49963: mailbox: bcm2835: Fix timeout during suspend mode (bsc#1232147).\n- CVE-2024-49975: uprobes: fix kernel info leak via \u0027[uprobes]\u0027 vma (bsc#1232104).\n- CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912).\n- CVE-2024-50067: uprobe: avoid out-of-bounds memory access of fetching args (bsc#1232416).\n- CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248).\n- CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522).\n- CVE-2024-53217: nfsd: restore callback functionality for NFSv4.0 (bsc#1234999).\n- CVE-2024-56633: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data (bsc#1235485).\n- CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435).\n- CVE-2024-56658: net: defer final \u0027struct net\u0027 free in netns dismantle (bsc#1235441).\n- CVE-2024-56688: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (bsc#1235538).\n- CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current-\u003ensproxy (bsc#1236115).\n- CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current-\u003ensproxy (bsc#1236122).\n- CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current-\u003ensproxy (bsc#1236123).\n- CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689).\n- CVE-2025-21689: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (bsc#1237017).\n- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).\n- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).\n- CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875).\n\nThe following non-security bugs were fixed:\n\n- bpf: fix mixed signed/unsigned derived min/max value bounds (bsc#1050081).\n- btrfs: add a flag to iterate_inodes_from_logical to find all\n- btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for uncompressed extents (bsc#1174206).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).\n- drm/amd/powerplay: Fix missing break in switch (bsc#1120902)\n- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).\n- drm/i915: Restore planes after load detection (bsc#1051510).\n- drm/i915: always return something on DDI clock selection (bsc#1120902)\n- drm/msm/mdp5: Fix global state lock backoff (bsc#1238275)\n- fix SCTP regression (bsc#1158082)\n- fixup \u0027rpm: support gz and zst compression methods\u0027 once more (bsc#1190428, bsc#1190358).\n- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).\n- kABI: Add clear_trace to trace_array (bsc#1232163).\n- kABI: Preserve TRACE_EVENT_FL values (bsc#1232163).\n- mm, numa: Migrate pages to local nodes quicker early in the lifetime of a task (bnc#1101669).\n- mm, numa: Remove rate-limiting of automatic numa balancing migration (bnc#1101669).\n- net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).\n- net: netvsc: Update default VMBus channels (bsc#1236757).\n- powerpc/64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- powerpc/papr_scm: Fix DIMM device registration race  (FATE#326628, bsc#1113295, git-fixes).\n- powerpc/papr_scm: Fix DIMM device registration race (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Fix resource end address (FATE#326628,  bsc#1113295, git-fixes).\n- powerpc/papr_scm: Fix resource end address (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Remove endian conversions (FATE#326628,  bsc#1113295, git-fixes).\n- powerpc/papr_scm: Remove endian conversions (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Update DT properties (FATE#326628,  bsc#1113295, git-fixes).\n- powerpc/papr_scm: Update DT properties (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Use depend instead of select (FATE#326628,  bsc#1113295, git-fixes).\n- powerpc/papr_scm: Use depend instead of select (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Use ibm,unit-guid as the iset cookie  (FATE#326628, bsc#1113295, git-fixes).\n- powerpc/papr_scm: Use ibm,unit-guid as the iset cookie (bsc#1113295, git-fixes).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression\n- rpm/kernel-source.spec.in: Add subpackage-names.conf as source.\n- s390/cpum_cf: rename IBM z13/z14 counter names (FATE#326341,  LTC#169491, bsc#1100823).\n- s390/cpum_cf: rename IBM z13/z14 counter names (LTC#169491, bsc#1100823).\n- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).\n- sched/numa: Avoid task migration for small NUMA improvement (bnc#1101669).\n- sched/numa: Pass destination CPU as a parameter to migrate_task_rq (bnc#1101669).\n- sched/numa: Reset scan rate whenever task moves across nodes (bnc#1101669).\n- sched/numa: Stop multiple tasks from moving to the CPU at the same time (bnc#1101669).\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: storvsc: Add validation for untrusted Hyper-V values (git-fixes).\n- scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix spelling mistake (git-fixes).\n- scsi: storvsc: Handle SRB status value 0x30 (git-fixes).\n- scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).\n- scsi: storvsc: Miscellaneous code cleanups (git-fixes).\n- scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).\n- scsi: storvsc: Update error logging (git-fixes).\n- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).\n- smb2: fix missing files in root share directory listing (bsc#1112907).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fix reset of bytes read and written stats (bsc#1112906).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n- tracing: Only have rmmod clear buffers that its events were active in (bsc#1232163).\n- ubi: fastmap: Cancel work upon detach (bsc#1051510).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-834,SUSE-SLE-HA-12-SP5-2025-834,SUSE-SLE-Live-Patching-12-SP5-2025-834,SUSE-SLE-SERVER-12-SP5-LTSS-2025-834,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-834",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0834-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:0834-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:0834-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050081",
        "url": "https://bugzilla.suse.com/1050081"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1100823",
        "url": "https://bugzilla.suse.com/1100823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1101669",
        "url": "https://bugzilla.suse.com/1101669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104731",
        "url": "https://bugzilla.suse.com/1104731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112246",
        "url": "https://bugzilla.suse.com/1112246"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112894",
        "url": "https://bugzilla.suse.com/1112894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112899",
        "url": "https://bugzilla.suse.com/1112899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112902",
        "url": "https://bugzilla.suse.com/1112902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112903",
        "url": "https://bugzilla.suse.com/1112903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112905",
        "url": "https://bugzilla.suse.com/1112905"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112906",
        "url": "https://bugzilla.suse.com/1112906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112907",
        "url": "https://bugzilla.suse.com/1112907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113295",
        "url": "https://bugzilla.suse.com/1113295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1120902",
        "url": "https://bugzilla.suse.com/1120902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1141539",
        "url": "https://bugzilla.suse.com/1141539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158082",
        "url": "https://bugzilla.suse.com/1158082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174206",
        "url": "https://bugzilla.suse.com/1174206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175165",
        "url": "https://bugzilla.suse.com/1175165"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179444",
        "url": "https://bugzilla.suse.com/1179444"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186482",
        "url": "https://bugzilla.suse.com/1186482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188601",
        "url": "https://bugzilla.suse.com/1188601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190358",
        "url": "https://bugzilla.suse.com/1190358"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190428",
        "url": "https://bugzilla.suse.com/1190428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191881",
        "url": "https://bugzilla.suse.com/1191881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201420",
        "url": "https://bugzilla.suse.com/1201420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203410",
        "url": "https://bugzilla.suse.com/1203410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203935",
        "url": "https://bugzilla.suse.com/1203935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207168",
        "url": "https://bugzilla.suse.com/1207168"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1212051",
        "url": "https://bugzilla.suse.com/1212051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1217947",
        "url": "https://bugzilla.suse.com/1217947"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219169",
        "url": "https://bugzilla.suse.com/1219169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220946",
        "url": "https://bugzilla.suse.com/1220946"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221816",
        "url": "https://bugzilla.suse.com/1221816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222803",
        "url": "https://bugzilla.suse.com/1222803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223432",
        "url": "https://bugzilla.suse.com/1223432"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223509",
        "url": "https://bugzilla.suse.com/1223509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223512",
        "url": "https://bugzilla.suse.com/1223512"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223524",
        "url": "https://bugzilla.suse.com/1223524"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223626",
        "url": "https://bugzilla.suse.com/1223626"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223627",
        "url": "https://bugzilla.suse.com/1223627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223712",
        "url": "https://bugzilla.suse.com/1223712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223715",
        "url": "https://bugzilla.suse.com/1223715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223744",
        "url": "https://bugzilla.suse.com/1223744"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223819",
        "url": "https://bugzilla.suse.com/1223819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224095",
        "url": "https://bugzilla.suse.com/1224095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224988",
        "url": "https://bugzilla.suse.com/1224988"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225742",
        "url": "https://bugzilla.suse.com/1225742"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231885",
        "url": "https://bugzilla.suse.com/1231885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231912",
        "url": "https://bugzilla.suse.com/1231912"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231920",
        "url": "https://bugzilla.suse.com/1231920"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231941",
        "url": "https://bugzilla.suse.com/1231941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232104",
        "url": "https://bugzilla.suse.com/1232104"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232147",
        "url": "https://bugzilla.suse.com/1232147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232159",
        "url": "https://bugzilla.suse.com/1232159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232163",
        "url": "https://bugzilla.suse.com/1232163"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232198",
        "url": "https://bugzilla.suse.com/1232198"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232201",
        "url": "https://bugzilla.suse.com/1232201"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232262",
        "url": "https://bugzilla.suse.com/1232262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232416",
        "url": "https://bugzilla.suse.com/1232416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232520",
        "url": "https://bugzilla.suse.com/1232520"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232919",
        "url": "https://bugzilla.suse.com/1232919"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1233248",
        "url": "https://bugzilla.suse.com/1233248"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1233522",
        "url": "https://bugzilla.suse.com/1233522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234853",
        "url": "https://bugzilla.suse.com/1234853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234891",
        "url": "https://bugzilla.suse.com/1234891"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234963",
        "url": "https://bugzilla.suse.com/1234963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234999",
        "url": "https://bugzilla.suse.com/1234999"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235054",
        "url": "https://bugzilla.suse.com/1235054"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235061",
        "url": "https://bugzilla.suse.com/1235061"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235073",
        "url": "https://bugzilla.suse.com/1235073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235435",
        "url": "https://bugzilla.suse.com/1235435"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235441",
        "url": "https://bugzilla.suse.com/1235441"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235485",
        "url": "https://bugzilla.suse.com/1235485"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235538",
        "url": "https://bugzilla.suse.com/1235538"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235965",
        "url": "https://bugzilla.suse.com/1235965"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236115",
        "url": "https://bugzilla.suse.com/1236115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236122",
        "url": "https://bugzilla.suse.com/1236122"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236123",
        "url": "https://bugzilla.suse.com/1236123"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236689",
        "url": "https://bugzilla.suse.com/1236689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236757",
        "url": "https://bugzilla.suse.com/1236757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236761",
        "url": "https://bugzilla.suse.com/1236761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236821",
        "url": "https://bugzilla.suse.com/1236821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237017",
        "url": "https://bugzilla.suse.com/1237017"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237025",
        "url": "https://bugzilla.suse.com/1237025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237159",
        "url": "https://bugzilla.suse.com/1237159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237738",
        "url": "https://bugzilla.suse.com/1237738"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237758",
        "url": "https://bugzilla.suse.com/1237758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237766",
        "url": "https://bugzilla.suse.com/1237766"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237778",
        "url": "https://bugzilla.suse.com/1237778"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237783",
        "url": "https://bugzilla.suse.com/1237783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237788",
        "url": "https://bugzilla.suse.com/1237788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237875",
        "url": "https://bugzilla.suse.com/1237875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237982",
        "url": "https://bugzilla.suse.com/1237982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238006",
        "url": "https://bugzilla.suse.com/1238006"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238033",
        "url": "https://bugzilla.suse.com/1238033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238041",
        "url": "https://bugzilla.suse.com/1238041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238107",
        "url": "https://bugzilla.suse.com/1238107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238148",
        "url": "https://bugzilla.suse.com/1238148"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238256",
        "url": "https://bugzilla.suse.com/1238256"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238260",
        "url": "https://bugzilla.suse.com/1238260"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238270",
        "url": "https://bugzilla.suse.com/1238270"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238275",
        "url": "https://bugzilla.suse.com/1238275"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22543 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37159 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37159/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47634 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47634/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47644 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47644/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2991 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2991/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48636 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48636/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48650 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48650/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48664 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48664/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48953 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48953/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48975 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48975/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49006 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49006/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49076 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49080 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49089 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49089/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49124 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49124/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49134 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49134/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49135 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49135/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49151 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49151/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49178 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49178/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49182 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49182/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49201 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49247 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49247/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49490 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49626 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49626/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49661 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49661/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-0394 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-0394/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52572 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52572/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52646 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52653 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52853 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52853/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52924 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-6606 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-6606/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23307 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26810 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26810/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26929 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26929/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26930 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26930/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26931 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26931/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27054 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27388 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27388/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27397 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27397/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-47701 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-47701/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49867 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49867/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49884 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49884/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49950 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49950/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49963 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49963/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49975 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49975/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-50036 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-50036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-50067 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-50067/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-50073 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-50073/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-50115 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-50115/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-50251 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-50251/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-50304 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-50304/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53173 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53173/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53217 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53217/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53239 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53239/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56539 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56539/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56548 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56548/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56605 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56605/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56633 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56633/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56647 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56658 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56658/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56688 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57896 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21638 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21638/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21639 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21640 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21673 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21673/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21689 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21689/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21690 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21690/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21700 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21753 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21753/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2025-03-11T10:55:11Z",
      "generator": {
        "date": "2025-03-11T10:55:11Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:0834-1",
      "initial_release_date": "2025-03-11T10:55:11Z",
      "revision_history": [
        {
          "date": "2025-03-11T10:55:11Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.250.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.250.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-default-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.250.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.250.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.250.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.250.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-122.250.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-122.250.1.noarch",
                  "product_id": "kernel-devel-4.12.14-122.250.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-122.250.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-122.250.1.noarch",
                  "product_id": "kernel-docs-4.12.14-122.250.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-122.250.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-122.250.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-122.250.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-122.250.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-122.250.1.noarch",
                  "product_id": "kernel-macros-4.12.14-122.250.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-122.250.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-122.250.1.noarch",
                  "product_id": "kernel-source-4.12.14-122.250.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-122.250.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-122.250.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-122.250.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.250.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.250.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.250.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-122.250.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.250.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.250.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.250.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.250.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-default-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-default-kgraft-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-syms-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-122.250.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.250.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-122.250.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.250.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.250.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.250.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.250.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.250.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-default-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.250.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.250.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.250.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.250.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.250.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.250.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.250.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.250.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.250.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.250.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.250.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.250.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.250.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.250.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.250.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.250.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.250.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.250.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.250.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.250.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.250.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.250.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.250.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.250.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.250.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.250.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.250.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.250.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.250.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.250.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.250.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.250.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.250.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22543",
          "url": "https://www.suse.com/security/cve/CVE-2021-22543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186482 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186483 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1186483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1190276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2021-22543",
          "url": "https://bugzilla.suse.com/1197660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-37159",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37159"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37159",
          "url": "https://www.suse.com/security/cve/CVE-2021-37159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188601 for CVE-2021-37159",
          "url": "https://bugzilla.suse.com/1188601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-37159"
    },
    {
      "cve": "CVE-2021-47634",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47634"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl\n\nHulk Robot reported a KASAN report about use-after-free:\n ==================================================================\n BUG: KASAN: use-after-free in __list_del_entry_valid+0x13d/0x160\n Read of size 8 at addr ffff888035e37d98 by task ubiattach/1385\n [...]\n Call Trace:\n  klist_dec_and_del+0xa7/0x4a0\n  klist_put+0xc7/0x1a0\n  device_del+0x4d4/0xed0\n  cdev_device_del+0x1a/0x80\n  ubi_attach_mtd_dev+0x2951/0x34b0 [ubi]\n  ctrl_cdev_ioctl+0x286/0x2f0 [ubi]\n\n Allocated by task 1414:\n  device_add+0x60a/0x18b0\n  cdev_device_add+0x103/0x170\n  ubi_create_volume+0x1118/0x1a10 [ubi]\n  ubi_cdev_ioctl+0xb7f/0x1ba0 [ubi]\n\n Freed by task 1385:\n  cdev_device_del+0x1a/0x80\n  ubi_remove_volume+0x438/0x6c0 [ubi]\n  ubi_cdev_ioctl+0xbf4/0x1ba0 [ubi]\n [...]\n ==================================================================\n\nThe lock held by ctrl_cdev_ioctl is ubi_devices_mutex, but the lock held\nby ubi_cdev_ioctl is ubi-\u003edevice_mutex. Therefore, the two locks can be\nconcurrent.\n\nctrl_cdev_ioctl contains two operations: ubi_attach and ubi_detach.\nubi_detach is bug-free because it uses reference counting to prevent\nconcurrency. However, uif_init and uif_close in ubi_attach may race with\nubi_cdev_ioctl.\n\nuif_init will race with ubi_cdev_ioctl as in the following stack.\n           cpu1                   cpu2                  cpu3\n_______________________|________________________|______________________\nctrl_cdev_ioctl\n ubi_attach_mtd_dev\n  uif_init\n                           ubi_cdev_ioctl\n                            ubi_create_volume\n                             cdev_device_add\n   ubi_add_volume\n   // sysfs exist\n   kill_volumes\n                                                    ubi_cdev_ioctl\n                                                     ubi_remove_volume\n                                                      cdev_device_del\n                                                       // first free\n    ubi_free_volume\n     cdev_del\n     // double free\n   cdev_device_del\n\nAnd uif_close will race with ubi_cdev_ioctl as in the following stack.\n           cpu1                   cpu2                  cpu3\n_______________________|________________________|______________________\nctrl_cdev_ioctl\n ubi_attach_mtd_dev\n  uif_init\n                           ubi_cdev_ioctl\n                            ubi_create_volume\n                             cdev_device_add\n  ubi_debugfs_init_dev\n  //error goto out_uif;\n  uif_close\n   kill_volumes\n                                                    ubi_cdev_ioctl\n                                                     ubi_remove_volume\n                                                      cdev_device_del\n                                                       // first free\n    ubi_free_volume\n    // double free\n\nThe cause of this problem is that commit 714fb87e8bc0 make device\n\"available\" before it becomes accessible via sysfs. Therefore, we\nroll back the modification. We will fix the race condition between\nubi device creation and udev by removing ubi_get_device in\nvol_attribute_show and dev_attribute_show.This avoids accessing\nuninitialized ubi_devices[ubi_num].\n\nubi_get_device is used to prevent devices from being deleted during\nsysfs execution. However, now kernfs ensures that devices will not\nbe deleted before all reference counting are released.\nThe key process is shown in the following stack.\n\ndevice_del\n  device_remove_attrs\n    device_remove_groups\n      sysfs_remove_groups\n        sysfs_remove_group\n          remove_files\n            kernfs_remove_by_name\n              kernfs_remove_by_name_ns\n                __kernfs_remove\n                  kernfs_drain",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47634",
          "url": "https://www.suse.com/security/cve/CVE-2021-47634"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237758 for CVE-2021-47634",
          "url": "https://bugzilla.suse.com/1237758"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47634"
    },
    {
      "cve": "CVE-2021-47644",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47644"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: staging: media: zoran: move videodev alloc\n\nMove some code out of zr36057_init() and create new functions for handling\nzr-\u003evideo_dev. This permit to ease code reading and fix a zr-\u003evideo_dev\nmemory leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47644",
          "url": "https://www.suse.com/security/cve/CVE-2021-47644"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237766 for CVE-2021-47644",
          "url": "https://bugzilla.suse.com/1237766"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47644"
    },
    {
      "cve": "CVE-2022-2991",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2991"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow was found in the Linux kernel\u0027s LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2991",
          "url": "https://www.suse.com/security/cve/CVE-2022-2991"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201420 for CVE-2022-2991",
          "url": "https://bugzilla.suse.com/1201420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203993 for CVE-2022-2991",
          "url": "https://bugzilla.suse.com/1203993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211495 for CVE-2022-2991",
          "url": "https://bugzilla.suse.com/1211495"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2991"
    },
    {
      "cve": "CVE-2022-48636",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48636"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu-\u003elock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu-\u003elock held.\n\nFix by checking the pavgroup pointer with lcu-\u003elock held.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48636",
          "url": "https://www.suse.com/security/cve/CVE-2022-48636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223512 for CVE-2022-48636",
          "url": "https://bugzilla.suse.com/1223512"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48636"
    },
    {
      "cve": "CVE-2022-48650",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48650"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()\n\nCommit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")\nmade the __qlt_24xx_handle_abts() function return early if\ntcm_qla2xxx_find_cmd_by_tag() didn\u0027t find a command, but it missed to clean\nup the allocated memory for the management command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48650",
          "url": "https://www.suse.com/security/cve/CVE-2022-48650"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223509 for CVE-2022-48650",
          "url": "https://bugzilla.suse.com/1223509"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48650"
    },
    {
      "cve": "CVE-2022-48664",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48664"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix hang during unmount when stopping a space reclaim worker\n\nOften when running generic/562 from fstests we can hang during unmount,\nresulting in a trace like this:\n\n  Sep 07 11:52:00 debian9 unknown: run fstests generic/562 at 2022-09-07 11:52:00\n  Sep 07 11:55:32 debian9 kernel: INFO: task umount:49438 blocked for more than 120 seconds.\n  Sep 07 11:55:32 debian9 kernel:       Not tainted 6.0.0-rc2-btrfs-next-122 #1\n  Sep 07 11:55:32 debian9 kernel: \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n  Sep 07 11:55:32 debian9 kernel: task:umount          state:D stack:    0 pid:49438 ppid: 25683 flags:0x00004000\n  Sep 07 11:55:32 debian9 kernel: Call Trace:\n  Sep 07 11:55:32 debian9 kernel:  \u003cTASK\u003e\n  Sep 07 11:55:32 debian9 kernel:  __schedule+0x3c8/0xec0\n  Sep 07 11:55:32 debian9 kernel:  ? rcu_read_lock_sched_held+0x12/0x70\n  Sep 07 11:55:32 debian9 kernel:  schedule+0x5d/0xf0\n  Sep 07 11:55:32 debian9 kernel:  schedule_timeout+0xf1/0x130\n  Sep 07 11:55:32 debian9 kernel:  ? lock_release+0x224/0x4a0\n  Sep 07 11:55:32 debian9 kernel:  ? lock_acquired+0x1a0/0x420\n  Sep 07 11:55:32 debian9 kernel:  ? trace_hardirqs_on+0x2c/0xd0\n  Sep 07 11:55:32 debian9 kernel:  __wait_for_common+0xac/0x200\n  Sep 07 11:55:32 debian9 kernel:  ? usleep_range_state+0xb0/0xb0\n  Sep 07 11:55:32 debian9 kernel:  __flush_work+0x26d/0x530\n  Sep 07 11:55:32 debian9 kernel:  ? flush_workqueue_prep_pwqs+0x140/0x140\n  Sep 07 11:55:32 debian9 kernel:  ? trace_clock_local+0xc/0x30\n  Sep 07 11:55:32 debian9 kernel:  __cancel_work_timer+0x11f/0x1b0\n  Sep 07 11:55:32 debian9 kernel:  ? close_ctree+0x12b/0x5b3 [btrfs]\n  Sep 07 11:55:32 debian9 kernel:  ? __trace_bputs+0x10b/0x170\n  Sep 07 11:55:32 debian9 kernel:  close_ctree+0x152/0x5b3 [btrfs]\n  Sep 07 11:55:32 debian9 kernel:  ? evict_inodes+0x166/0x1c0\n  Sep 07 11:55:32 debian9 kernel:  generic_shutdown_super+0x71/0x120\n  Sep 07 11:55:32 debian9 kernel:  kill_anon_super+0x14/0x30\n  Sep 07 11:55:32 debian9 kernel:  btrfs_kill_super+0x12/0x20 [btrfs]\n  Sep 07 11:55:32 debian9 kernel:  deactivate_locked_super+0x2e/0xa0\n  Sep 07 11:55:32 debian9 kernel:  cleanup_mnt+0x100/0x160\n  Sep 07 11:55:32 debian9 kernel:  task_work_run+0x59/0xa0\n  Sep 07 11:55:32 debian9 kernel:  exit_to_user_mode_prepare+0x1a6/0x1b0\n  Sep 07 11:55:32 debian9 kernel:  syscall_exit_to_user_mode+0x16/0x40\n  Sep 07 11:55:32 debian9 kernel:  do_syscall_64+0x48/0x90\n  Sep 07 11:55:32 debian9 kernel:  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n  Sep 07 11:55:32 debian9 kernel: RIP: 0033:0x7fcde59a57a7\n  Sep 07 11:55:32 debian9 kernel: RSP: 002b:00007ffe914217c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6\n  Sep 07 11:55:32 debian9 kernel: RAX: 0000000000000000 RBX: 00007fcde5ae8264 RCX: 00007fcde59a57a7\n  Sep 07 11:55:32 debian9 kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055b57556cdd0\n  Sep 07 11:55:32 debian9 kernel: RBP: 000055b57556cba0 R08: 0000000000000000 R09: 00007ffe91420570\n  Sep 07 11:55:32 debian9 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n  Sep 07 11:55:32 debian9 kernel: R13: 000055b57556cdd0 R14: 000055b57556ccb8 R15: 0000000000000000\n  Sep 07 11:55:32 debian9 kernel:  \u003c/TASK\u003e\n\nWhat happens is the following:\n\n1) The cleaner kthread tries to start a transaction to delete an unused\n   block group, but the metadata reservation can not be satisfied right\n   away, so a reservation ticket is created and it starts the async\n   metadata reclaim task (fs_info-\u003easync_reclaim_work);\n\n2) Writeback for all the filler inodes with an i_size of 2K starts\n   (generic/562 creates a lot of 2K files with the goal of filling\n   metadata space). We try to create an inline extent for them, but we\n   fail when trying to insert the inline extent with -ENOSPC (at\n   cow_file_range_inline()) - since this is not critical, we fallback\n   to non-inline mode (back to cow_file_range()), reserve extents\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48664",
          "url": "https://www.suse.com/security/cve/CVE-2022-48664"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223524 for CVE-2022-48664",
          "url": "https://bugzilla.suse.com/1223524"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48664"
    },
    {
      "cve": "CVE-2022-48953",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48953"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtc: cmos: Fix event handler registration ordering issue\n\nBecause acpi_install_fixed_event_handler() enables the event\nautomatically on success, it is incorrect to call it before the\nhandler routine passed to it is ready to handle events.\n\nUnfortunately, the rtc-cmos driver does exactly the incorrect thing\nby calling cmos_wake_setup(), which passes rtc_handler() to\nacpi_install_fixed_event_handler(), before cmos_do_probe(), because\nrtc_handler() uses dev_get_drvdata() to get to the cmos object\npointer and the driver data pointer is only populated in\ncmos_do_probe().\n\nThis leads to a NULL pointer dereference in rtc_handler() on boot\nif the RTC fixed event happens to be active at the init time.\n\nTo address this issue, change the initialization ordering of the\ndriver so that cmos_wake_setup() is always called after a successful\ncmos_do_probe() call.\n\nWhile at it, change cmos_pnp_probe() to call cmos_do_probe() after\nthe initial if () statement used for computing the IRQ argument to\nbe passed to cmos_do_probe() which is cleaner than calling it in\neach branch of that if () (local variable \"irq\" can be of type int,\nbecause it is passed to that function as an argument of type int).\n\nNote that commit 6492fed7d8c9 (\"rtc: rtc-cmos: Do not check\nACPI_FADT_LOW_POWER_S0\") caused this issue to affect a larger number\nof systems, because previously it only affected systems with\nACPI_FADT_LOW_POWER_S0 set, but it is present regardless of that\ncommit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48953",
          "url": "https://www.suse.com/security/cve/CVE-2022-48953"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1231941 for CVE-2022-48953",
          "url": "https://bugzilla.suse.com/1231941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48953"
    },
    {
      "cve": "CVE-2022-48975",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48975"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: fix memory leak in gpiochip_setup_dev()\n\nHere is a backtrace report about memory leak detected in\ngpiochip_setup_dev():\n\nunreferenced object 0xffff88810b406400 (size 512):\n  comm \"python3\", pid 1682, jiffies 4295346908 (age 24.090s)\n  backtrace:\n    kmalloc_trace\n    device_add\t\tdevice_private_init at drivers/base/core.c:3361\n\t\t\t(inlined by) device_add at drivers/base/core.c:3411\n    cdev_device_add\n    gpiolib_cdev_register\n    gpiochip_setup_dev\n    gpiochip_add_data_with_key\n\ngcdev_register() \u0026 gcdev_unregister() would call device_add() \u0026\ndevice_del() (no matter CONFIG_GPIO_CDEV is enabled or not) to\nregister/unregister device.\n\nHowever, if device_add() succeeds, some resource (like\nstruct device_private allocated by device_private_init())\nis not released by device_del().\n\nTherefore, after device_add() succeeds by gcdev_register(), it\nneeds to call put_device() to release resource in the error handle\npath.\n\nHere we move forward the register of release function, and let it\nrelease every piece of resource by put_device() instead of kfree().\n\nWhile at it, fix another subtle issue, i.e. when gc-\u003engpio is equal\nto 0, we still call kcalloc() and, in case of further error, kfree()\non the ZERO_PTR pointer, which is not NULL. It\u0027s not a bug per se,\nbut rather waste of the resources and potentially wrong expectation\nabout contents of the gdev-\u003edescs variable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48975",
          "url": "https://www.suse.com/security/cve/CVE-2022-48975"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1231885 for CVE-2022-48975",
          "url": "https://bugzilla.suse.com/1231885"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48975"
    },
    {
      "cve": "CVE-2022-49006",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49006"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Free buffers when a used dynamic event is removed\n\nAfter 65536 dynamic events have been added and removed, the \"type\" field\nof the event then uses the first type number that is available (not\ncurrently used by other events). A type number is the identifier of the\nbinary blobs in the tracing ring buffer (known as events) to map them to\nlogic that can parse the binary blob.\n\nThe issue is that if a dynamic event (like a kprobe event) is traced and\nis in the ring buffer, and then that event is removed (because it is\ndynamic, which means it can be created and destroyed), if another dynamic\nevent is created that has the same number that new event\u0027s logic on\nparsing the binary blob will be used.\n\nTo show how this can be an issue, the following can crash the kernel:\n\n # cd /sys/kernel/tracing\n # for i in `seq 65536`; do\n     echo \u0027p:kprobes/foo do_sys_openat2 $arg1:u32\u0027 \u003e kprobe_events\n # done\n\nFor every iteration of the above, the writing to the kprobe_events will\nremove the old event and create a new one (with the same format) and\nincrease the type number to the next available on until the type number\nreaches over 65535 which is the max number for the 16 bit type. After it\nreaches that number, the logic to allocate a new number simply looks for\nthe next available number. When an dynamic event is removed, that number\nis then available to be reused by the next dynamic event created. That is,\nonce the above reaches the max number, the number assigned to the event in\nthat loop will remain the same.\n\nNow that means deleting one dynamic event and created another will reuse\nthe previous events type number. This is where bad things can happen.\nAfter the above loop finishes, the kprobes/foo event which reads the\ndo_sys_openat2 function call\u0027s first parameter as an integer.\n\n # echo 1 \u003e kprobes/foo/enable\n # cat /etc/passwd \u003e /dev/null\n # cat trace\n             cat-2211    [005] ....  2007.849603: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196\n             cat-2211    [005] ....  2007.849620: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196\n             cat-2211    [005] ....  2007.849838: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196\n             cat-2211    [005] ....  2007.849880: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196\n # echo 0 \u003e kprobes/foo/enable\n\nNow if we delete the kprobe and create a new one that reads a string:\n\n # echo \u0027p:kprobes/foo do_sys_openat2 +0($arg2):string\u0027 \u003e kprobe_events\n\nAnd now we can the trace:\n\n # cat trace\n        sendmail-1942    [002] .....   530.136320: foo: (do_sys_openat2+0x0/0x240) arg1=             cat-2046    [004] .....   530.930817: foo: (do_sys_openat2+0x0/0x240) arg1=\"\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\"\n             cat-2046    [004] .....   530.930961: foo: (do_sys_openat2+0x0/0x240) arg1=\"\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\"\n             cat-2046    [004] .....   530.934278: foo: (do_sys_openat2+0x0/0x240) arg1=\"\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\"\n             cat-2046    [004] .....   530.934563: foo: (do_sys_openat2+0x0/0x240) arg1=\"\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49006",
          "url": "https://www.suse.com/security/cve/CVE-2022-49006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232163 for CVE-2022-49006",
          "url": "https://bugzilla.suse.com/1232163"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49006"
    },
    {
      "cve": "CVE-2022-49076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: Fix use-after-free bug for mm struct\n\nUnder certain conditions, such as MPI_Abort, the hfi1 cleanup code may\nrepresent the last reference held on the task mm.\nhfi1_mmu_rb_unregister() then drops the last reference and the mm is freed\nbefore the final use in hfi1_release_user_pages().  A new task may\nallocate the mm structure while it is still being used, resulting in\nproblems. One manifestation is corruption of the mmap_sem counter leading\nto a hang in down_write().  Another is corruption of an mm struct that is\nin use by another task.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49076",
          "url": "https://www.suse.com/security/cve/CVE-2022-49076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237738 for CVE-2022-49076",
          "url": "https://bugzilla.suse.com/1237738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49076"
    },
    {
      "cve": "CVE-2022-49080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/mempolicy: fix mpol_new leak in shared_policy_replace\n\nIf mpol_new is allocated but not used in restart loop, mpol_new will be\nfreed via mpol_put before returning to the caller.  But refcnt is not\ninitialized yet, so mpol_put could not do the right things and might\nleak the unused mpol_new.  This would happen if mempolicy was updated on\nthe shared shmem file while the sp-\u003elock has been dropped during the\nmemory allocation.\n\nThis issue could be triggered easily with the below code snippet if\nthere are many processes doing the below work at the same time:\n\n  shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT);\n  shm = shmat(shmid, 0, 0);\n  loop many times {\n    mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0);\n    mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask,\n          maxnode, 0);\n  }",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49080",
          "url": "https://www.suse.com/security/cve/CVE-2022-49080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238033 for CVE-2022-49080",
          "url": "https://bugzilla.suse.com/1238033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238324 for CVE-2022-49080",
          "url": "https://bugzilla.suse.com/1238324"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49080"
    },
    {
      "cve": "CVE-2022-49089",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49089"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition\n\nThe documentation of the function rvt_error_qp says both r_lock and s_lock\nneed to be held when calling that function.  It also asserts using lockdep\nthat both of those locks are held.  However, the commit I referenced in\nFixes accidentally makes the call to rvt_error_qp in rvt_ruc_loopback no\nlonger covered by r_lock.  This results in the lockdep assertion failing\nand also possibly in a race condition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49089",
          "url": "https://www.suse.com/security/cve/CVE-2022-49089"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238041 for CVE-2022-49089",
          "url": "https://bugzilla.suse.com/1238041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49089"
    },
    {
      "cve": "CVE-2022-49124",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49124"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49124",
          "url": "https://www.suse.com/security/cve/CVE-2022-49124"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238148 for CVE-2022-49124",
          "url": "https://bugzilla.suse.com/1238148"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49124"
    },
    {
      "cve": "CVE-2022-49134",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49134"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum: Guard against invalid local ports\n\nWhen processing events generated by the device\u0027s firmware, the driver\nprotects itself from events reported for non-existent local ports, but\nnot for the CPU port (local port 0), which exists, but does not have all\nthe fields as any local port.\n\nThis can result in a NULL pointer dereference when trying access\n\u0027struct mlxsw_sp_port\u0027 fields which are not initialized for CPU port.\n\nCommit 63b08b1f6834 (\"mlxsw: spectrum: Protect driver from buggy firmware\")\nalready handled such issue by bailing early when processing a PUDE event\nreported for the CPU port.\n\nGeneralize the approach by moving the check to a common function and\nmaking use of it in all relevant places.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49134",
          "url": "https://www.suse.com/security/cve/CVE-2022-49134"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237982 for CVE-2022-49134",
          "url": "https://bugzilla.suse.com/1237982"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49134"
    },
    {
      "cve": "CVE-2022-49135",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49135"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix memory leak\n\n[why]\nResource release is needed on the error handling path\nto prevent memory leak.\n\n[how]\nFix this by adding kfree on the error handling path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49135",
          "url": "https://www.suse.com/security/cve/CVE-2022-49135"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238006 for CVE-2022-49135",
          "url": "https://bugzilla.suse.com/1238006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49135"
    },
    {
      "cve": "CVE-2022-49151",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49151"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: properly check endpoint type\n\nSyzbot reported warning in usb_submit_urb() which is caused by wrong\nendpoint type. We should check that in endpoint is actually present to\nprevent this warning.\n\nFound pipes are now saved to struct mcba_priv and code uses them\ndirectly instead of making pipes in place.\n\nFail log:\n\n| usb 5-1: BOGUS urb xfer, pipe 3 != type 1\n| WARNING: CPU: 1 PID: 49 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n| Modules linked in:\n| CPU: 1 PID: 49 Comm: kworker/1:2 Not tainted 5.17.0-rc6-syzkaller-00184-g38f80f42147f #0\n| Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\n| Workqueue: usb_hub_wq hub_event\n| RIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n| ...\n| Call Trace:\n|  \u003cTASK\u003e\n|  mcba_usb_start drivers/net/can/usb/mcba_usb.c:662 [inline]\n|  mcba_usb_probe+0x8a3/0xc50 drivers/net/can/usb/mcba_usb.c:858\n|  usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396\n|  call_driver_probe drivers/base/dd.c:517 [inline]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49151",
          "url": "https://www.suse.com/security/cve/CVE-2022-49151"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237778 for CVE-2022-49151",
          "url": "https://bugzilla.suse.com/1237778"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49151"
    },
    {
      "cve": "CVE-2022-49178",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49178"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemstick/mspro_block: fix handling of read-only devices\n\nUse set_disk_ro to propagate the read-only state to the block layer\ninstead of checking for it in -\u003eopen and leaking a reference in case\nof a read-only device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49178",
          "url": "https://www.suse.com/security/cve/CVE-2022-49178"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238107 for CVE-2022-49178",
          "url": "https://bugzilla.suse.com/1238107"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49178"
    },
    {
      "cve": "CVE-2022-49182",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49182"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: add vlan list lock to protect vlan list\n\nWhen adding port base VLAN, vf VLAN need to remove from HW and modify\nthe vlan state in vf VLAN list as false. If the periodicity task is\nfreeing the same node, it may cause \"use after free\" error.\nThis patch adds a vlan list lock to protect the vlan list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49182",
          "url": "https://www.suse.com/security/cve/CVE-2022-49182"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238260 for CVE-2022-49182",
          "url": "https://bugzilla.suse.com/1238260"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49182"
    },
    {
      "cve": "CVE-2022-49201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: fix race between xmit and reset\n\nThere is a race between reset and the transmit paths that can lead to\nibmvnic_xmit() accessing an scrq after it has been freed in the reset\npath. It can result in a crash like:\n\n\tKernel attempted to read user page (0) - exploit attempt? (uid: 0)\n\tBUG: Kernel NULL pointer dereference on read at 0x00000000\n\tFaulting instruction address: 0xc0080000016189f8\n\tOops: Kernel access of bad area, sig: 11 [#1]\n\t...\n\tNIP [c0080000016189f8] ibmvnic_xmit+0x60/0xb60 [ibmvnic]\n\tLR [c000000000c0046c] dev_hard_start_xmit+0x11c/0x280\n\tCall Trace:\n\t[c008000001618f08] ibmvnic_xmit+0x570/0xb60 [ibmvnic] (unreliable)\n\t[c000000000c0046c] dev_hard_start_xmit+0x11c/0x280\n\t[c000000000c9cfcc] sch_direct_xmit+0xec/0x330\n\t[c000000000bfe640] __dev_xmit_skb+0x3a0/0x9d0\n\t[c000000000c00ad4] __dev_queue_xmit+0x394/0x730\n\t[c008000002db813c] __bond_start_xmit+0x254/0x450 [bonding]\n\t[c008000002db8378] bond_start_xmit+0x40/0xc0 [bonding]\n\t[c000000000c0046c] dev_hard_start_xmit+0x11c/0x280\n\t[c000000000c00ca4] __dev_queue_xmit+0x564/0x730\n\t[c000000000cf97e0] neigh_hh_output+0xd0/0x180\n\t[c000000000cfa69c] ip_finish_output2+0x31c/0x5c0\n\t[c000000000cfd244] __ip_queue_xmit+0x194/0x4f0\n\t[c000000000d2a3c4] __tcp_transmit_skb+0x434/0x9b0\n\t[c000000000d2d1e0] __tcp_retransmit_skb+0x1d0/0x6a0\n\t[c000000000d2d984] tcp_retransmit_skb+0x34/0x130\n\t[c000000000d310e8] tcp_retransmit_timer+0x388/0x6d0\n\t[c000000000d315ec] tcp_write_timer_handler+0x1bc/0x330\n\t[c000000000d317bc] tcp_write_timer+0x5c/0x200\n\t[c000000000243270] call_timer_fn+0x50/0x1c0\n\t[c000000000243704] __run_timers.part.0+0x324/0x460\n\t[c000000000243894] run_timer_softirq+0x54/0xa0\n\t[c000000000ea713c] __do_softirq+0x15c/0x3e0\n\t[c000000000166258] __irq_exit_rcu+0x158/0x190\n\t[c000000000166420] irq_exit+0x20/0x40\n\t[c00000000002853c] timer_interrupt+0x14c/0x2b0\n\t[c000000000009a00] decrementer_common_virt+0x210/0x220\n\t--- interrupt: 900 at plpar_hcall_norets_notrace+0x18/0x2c\n\nThe immediate cause of the crash is the access of tx_scrq in the following\nsnippet during a reset, where the tx_scrq can be either NULL or an address\nthat will soon be invalid:\n\n\tibmvnic_xmit()\n\t{\n\t\t...\n\t\ttx_scrq = adapter-\u003etx_scrq[queue_num];\n\t\ttxq = netdev_get_tx_queue(netdev, queue_num);\n\t\tind_bufp = \u0026tx_scrq-\u003eind_buf;\n\n\t\tif (test_bit(0, \u0026adapter-\u003eresetting)) {\n\t\t...\n\t}\n\nBut beyond that, the call to ibmvnic_xmit() itself is not safe during a\nreset and the reset path attempts to avoid this by stopping the queue in\nibmvnic_cleanup(). However just after the queue was stopped, an in-flight\nibmvnic_complete_tx() could have restarted the queue even as the reset is\nprogressing.\n\nSince the queue was restarted we could get a call to ibmvnic_xmit() which\ncan then access the bad tx_scrq (or other fields).\n\nWe cannot however simply have ibmvnic_complete_tx() check the -\u003eresetting\nbit and skip starting the queue. This can race at the \"back-end\" of a good\nreset which just restarted the queue but has not cleared the -\u003eresetting\nbit yet. If we skip restarting the queue due to -\u003eresetting being true,\nthe queue would remain stopped indefinitely potentially leading to transmit\ntimeouts.\n\nIOW -\u003eresetting is too broad for this purpose. Instead use a new flag\nthat indicates whether or not the queues are active. Only the open/\nreset paths control when the queues are active. ibmvnic_complete_tx()\nand others wake up the queue only if the queue is marked active.\n\nSo we will have:\n\tA. reset/open thread in ibmvnic_cleanup() and __ibmvnic_open()\n\n\t\t-\u003eresetting = true\n\t\t-\u003etx_queues_active = false\n\t\tdisable tx queues\n\t\t...\n\t\t-\u003etx_queues_active = true\n\t\tstart tx queues\n\n\tB. Tx interrupt in ibmvnic_complete_tx():\n\n\t\tif (-\u003etx_queues_active)\n\t\t\tnetif_wake_subqueue();\n\nTo ensure that -\u003etx_queues_active and state of the queues are consistent,\nwe need a lock which:\n\n\t- must also be taken in the interrupt path (ibmvnic_complete_tx())\n\t- shared across the multiple\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49201",
          "url": "https://www.suse.com/security/cve/CVE-2022-49201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238256 for CVE-2022-49201",
          "url": "https://bugzilla.suse.com/1238256"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49201"
    },
    {
      "cve": "CVE-2022-49247",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49247"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED\n\nIf the callback \u0027start_streaming\u0027 fails, then all\nqueued buffers in the driver should be returned with\nstate \u0027VB2_BUF_STATE_QUEUED\u0027. Currently, they are\nreturned with \u0027VB2_BUF_STATE_ERROR\u0027 which is wrong.\nFix this. This also fixes the warning:\n\n[   65.583633] WARNING: CPU: 5 PID: 593 at drivers/media/common/videobuf2/videobuf2-core.c:1612 vb2_start_streaming+0xd4/0x160 [videobuf2_common]\n[   65.585027] Modules linked in: snd_usb_audio snd_hwdep snd_usbmidi_lib snd_rawmidi snd_soc_hdmi_codec dw_hdmi_i2s_audio saa7115 stk1160 videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common videodev mc crct10dif_ce panfrost snd_soc_simple_card snd_soc_audio_graph_card snd_soc_spdif_tx snd_soc_simple_card_utils gpu_sched phy_rockchip_pcie snd_soc_rockchip_i2s rockchipdrm analogix_dp dw_mipi_dsi dw_hdmi cec drm_kms_helper drm rtc_rk808 rockchip_saradc industrialio_triggered_buffer kfifo_buf rockchip_thermal pcie_rockchip_host ip_tables x_tables ipv6\n[   65.589383] CPU: 5 PID: 593 Comm: v4l2src0:src Tainted: G        W         5.16.0-rc4-62408-g32447129cb30-dirty #14\n[   65.590293] Hardware name: Radxa ROCK Pi 4B (DT)\n[   65.590696] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[   65.591304] pc : vb2_start_streaming+0xd4/0x160 [videobuf2_common]\n[   65.591850] lr : vb2_start_streaming+0x6c/0x160 [videobuf2_common]\n[   65.592395] sp : ffff800012bc3ad0\n[   65.592685] x29: ffff800012bc3ad0 x28: 0000000000000000 x27: ffff800012bc3cd8\n[   65.593312] x26: 0000000000000000 x25: ffff00000d8a7800 x24: 0000000040045612\n[   65.593938] x23: ffff800011323000 x22: ffff800012bc3cd8 x21: ffff00000908a8b0\n[   65.594562] x20: ffff00000908a8c8 x19: 00000000fffffff4 x18: ffffffffffffffff\n[   65.595188] x17: 000000040044ffff x16: 00400034b5503510 x15: ffff800011323f78\n[   65.595813] x14: ffff000013163886 x13: ffff000013163885 x12: 00000000000002ce\n[   65.596439] x11: 0000000000000028 x10: 0000000000000001 x9 : 0000000000000228\n[   65.597064] x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff726c5e78\n[   65.597690] x5 : ffff800012bc3990 x4 : 0000000000000000 x3 : ffff000009a34880\n[   65.598315] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000007cd99f0\n[   65.598940] Call trace:\n[   65.599155]  vb2_start_streaming+0xd4/0x160 [videobuf2_common]\n[   65.599672]  vb2_core_streamon+0x17c/0x1a8 [videobuf2_common]\n[   65.600179]  vb2_streamon+0x54/0x88 [videobuf2_v4l2]\n[   65.600619]  vb2_ioctl_streamon+0x54/0x60 [videobuf2_v4l2]\n[   65.601103]  v4l_streamon+0x3c/0x50 [videodev]\n[   65.601521]  __video_do_ioctl+0x1a4/0x428 [videodev]\n[   65.601977]  video_usercopy+0x320/0x828 [videodev]\n[   65.602419]  video_ioctl2+0x3c/0x58 [videodev]\n[   65.602830]  v4l2_ioctl+0x60/0x90 [videodev]\n[   65.603227]  __arm64_sys_ioctl+0xa8/0xe0\n[   65.603576]  invoke_syscall+0x54/0x118\n[   65.603911]  el0_svc_common.constprop.3+0x84/0x100\n[   65.604332]  do_el0_svc+0x34/0xa0\n[   65.604625]  el0_svc+0x1c/0x50\n[   65.604897]  el0t_64_sync_handler+0x88/0xb0\n[   65.605264]  el0t_64_sync+0x16c/0x170\n[   65.605587] ---[ end trace 578e0ba07742170d ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49247",
          "url": "https://www.suse.com/security/cve/CVE-2022-49247"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237783 for CVE-2022-49247",
          "url": "https://bugzilla.suse.com/1237783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49247"
    },
    {
      "cve": "CVE-2022-49490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected\n\nmdp5_get_global_state runs the risk of hitting a -EDEADLK when acquiring\nthe modeset lock, but currently mdp5_pipe_release doesn\u0027t check for if\nan error is returned. Because of this, there is a possibility of\nmdp5_pipe_release hitting a NULL dereference error.\n\nTo avoid this, let\u0027s have mdp5_pipe_release check if\nmdp5_get_global_state returns an error and propogate that error.\n\nChanges since v1:\n- Separated declaration and initialization of *new_state to avoid\n  compiler warning\n- Fixed some spelling mistakes in commit message\n\nChanges since v2:\n- Return 0 in case where hwpipe is NULL as this is considered normal\n  behavior\n- Added 2nd patch in series to fix a similar NULL dereference issue in\n  mdp5_mixer_release\n\nPatchwork: https://patchwork.freedesktop.org/patch/485179/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49490",
          "url": "https://www.suse.com/security/cve/CVE-2022-49490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238275 for CVE-2022-49490",
          "url": "https://bugzilla.suse.com/1238275"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49490"
    },
    {
      "cve": "CVE-2022-49626",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49626"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix use after free when disabling sriov\n\nUse after free is detected by kfence when disabling sriov. What was read\nafter being freed was vf-\u003epci_dev: it was freed from pci_disable_sriov\nand later read in efx_ef10_sriov_free_vf_vports, called from\nefx_ef10_sriov_free_vf_vswitching.\n\nSet the pointer to NULL at release time to not trying to read it later.\n\nReproducer and dmesg log (note that kfence doesn\u0027t detect it every time):\n$ echo 1 \u003e /sys/class/net/enp65s0f0np0/device/sriov_numvfs\n$ echo 0 \u003e /sys/class/net/enp65s0f0np0/device/sriov_numvfs\n\n BUG: KFENCE: use-after-free read in efx_ef10_sriov_free_vf_vswitching+0x82/0x170 [sfc]\n\n Use-after-free read at 0x00000000ff3c1ba5 (in kfence-#224):\n  efx_ef10_sriov_free_vf_vswitching+0x82/0x170 [sfc]\n  efx_ef10_pci_sriov_disable+0x38/0x70 [sfc]\n  efx_pci_sriov_configure+0x24/0x40 [sfc]\n  sriov_numvfs_store+0xfe/0x140\n  kernfs_fop_write_iter+0x11c/0x1b0\n  new_sync_write+0x11f/0x1b0\n  vfs_write+0x1eb/0x280\n  ksys_write+0x5f/0xe0\n  do_syscall_64+0x5c/0x80\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n kfence-#224: 0x00000000edb8ef95-0x00000000671f5ce1, size=2792, cache=kmalloc-4k\n\n allocated by task 6771 on cpu 10 at 3137.860196s:\n  pci_alloc_dev+0x21/0x60\n  pci_iov_add_virtfn+0x2a2/0x320\n  sriov_enable+0x212/0x3e0\n  efx_ef10_sriov_configure+0x67/0x80 [sfc]\n  efx_pci_sriov_configure+0x24/0x40 [sfc]\n  sriov_numvfs_store+0xba/0x140\n  kernfs_fop_write_iter+0x11c/0x1b0\n  new_sync_write+0x11f/0x1b0\n  vfs_write+0x1eb/0x280\n  ksys_write+0x5f/0xe0\n  do_syscall_64+0x5c/0x80\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n freed by task 6771 on cpu 12 at 3170.991309s:\n  device_release+0x34/0x90\n  kobject_cleanup+0x3a/0x130\n  pci_iov_remove_virtfn+0xd9/0x120\n  sriov_disable+0x30/0xe0\n  efx_ef10_pci_sriov_disable+0x57/0x70 [sfc]\n  efx_pci_sriov_configure+0x24/0x40 [sfc]\n  sriov_numvfs_store+0xfe/0x140\n  kernfs_fop_write_iter+0x11c/0x1b0\n  new_sync_write+0x11f/0x1b0\n  vfs_write+0x1eb/0x280\n  ksys_write+0x5f/0xe0\n  do_syscall_64+0x5c/0x80\n  entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49626",
          "url": "https://www.suse.com/security/cve/CVE-2022-49626"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238270 for CVE-2022-49626",
          "url": "https://bugzilla.suse.com/1238270"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49626"
    },
    {
      "cve": "CVE-2022-49661",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49661"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_open/close(): fix memory leak\n\nThe gs_usb driver appears to suffer from a malady common to many USB\nCAN adapter drivers in that it performs usb_alloc_coherent() to\nallocate a number of USB request blocks (URBs) for RX, and then later\nrelies on usb_kill_anchored_urbs() to free them, but this doesn\u0027t\nactually free them. As a result, this may be leaking DMA memory that\u0027s\nbeen used by the driver.\n\nThis commit is an adaptation of the techniques found in the esd_usb2\ndriver where a similar design pattern led to a memory leak. It\nexplicitly frees the RX URBs and their DMA memory via a call to\nusb_free_coherent(). Since the RX URBs were allocated in the\ngs_can_open(), we remove them in gs_can_close() rather than in the\ndisconnect function as was done in esd_usb2.\n\nFor more information, see the 928150fad41b (\"can: esd_usb2: fix memory\nleak\").",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49661",
          "url": "https://www.suse.com/security/cve/CVE-2022-49661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237788 for CVE-2022-49661",
          "url": "https://bugzilla.suse.com/1237788"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49661"
    },
    {
      "cve": "CVE-2023-0394",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-0394"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-0394",
          "url": "https://www.suse.com/security/cve/CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207168 for CVE-2023-0394",
          "url": "https://bugzilla.suse.com/1207168"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-0394"
    },
    {
      "cve": "CVE-2023-52572",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52572"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix UAF in cifs_demultiplex_thread()\n\nThere is a UAF when xfstests on cifs:\n\n  BUG: KASAN: use-after-free in smb2_is_network_name_deleted+0x27/0x160\n  Read of size 4 at addr ffff88810103fc08 by task cifsd/923\n\n  CPU: 1 PID: 923 Comm: cifsd Not tainted 6.1.0-rc4+ #45\n  ...\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x34/0x44\n   print_report+0x171/0x472\n   kasan_report+0xad/0x130\n   kasan_check_range+0x145/0x1a0\n   smb2_is_network_name_deleted+0x27/0x160\n   cifs_demultiplex_thread.cold+0x172/0x5a4\n   kthread+0x165/0x1a0\n   ret_from_fork+0x1f/0x30\n   \u003c/TASK\u003e\n\n  Allocated by task 923:\n   kasan_save_stack+0x1e/0x40\n   kasan_set_track+0x21/0x30\n   __kasan_slab_alloc+0x54/0x60\n   kmem_cache_alloc+0x147/0x320\n   mempool_alloc+0xe1/0x260\n   cifs_small_buf_get+0x24/0x60\n   allocate_buffers+0xa1/0x1c0\n   cifs_demultiplex_thread+0x199/0x10d0\n   kthread+0x165/0x1a0\n   ret_from_fork+0x1f/0x30\n\n  Freed by task 921:\n   kasan_save_stack+0x1e/0x40\n   kasan_set_track+0x21/0x30\n   kasan_save_free_info+0x2a/0x40\n   ____kasan_slab_free+0x143/0x1b0\n   kmem_cache_free+0xe3/0x4d0\n   cifs_small_buf_release+0x29/0x90\n   SMB2_negotiate+0x8b7/0x1c60\n   smb2_negotiate+0x51/0x70\n   cifs_negotiate_protocol+0xf0/0x160\n   cifs_get_smb_ses+0x5fa/0x13c0\n   mount_get_conns+0x7a/0x750\n   cifs_mount+0x103/0xd00\n   cifs_smb3_do_mount+0x1dd/0xcb0\n   smb3_get_tree+0x1d5/0x300\n   vfs_get_tree+0x41/0xf0\n   path_mount+0x9b3/0xdd0\n   __x64_sys_mount+0x190/0x1d0\n   do_syscall_64+0x35/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe UAF is because:\n\n mount(pid: 921)               | cifsd(pid: 923)\n-------------------------------|-------------------------------\n                               | cifs_demultiplex_thread\nSMB2_negotiate                 |\n cifs_send_recv                |\n  compound_send_recv           |\n   smb_send_rqst               |\n    wait_for_response          |\n     wait_event_state      [1] |\n                               |  standard_receive3\n                               |   cifs_handle_standard\n                               |    handle_mid\n                               |     mid-\u003eresp_buf = buf;  [2]\n                               |     dequeue_mid           [3]\n     KILL the process      [4] |\n    resp_iov[i].iov_base = buf |\n free_rsp_buf              [5] |\n                               |   is_network_name_deleted [6]\n                               |   callback\n\n1. After send request to server, wait the response until\n    mid-\u003emid_state != SUBMITTED;\n2. Receive response from server, and set it to mid;\n3. Set the mid state to RECEIVED;\n4. Kill the process, the mid state already RECEIVED, get 0;\n5. Handle and release the negotiate response;\n6. UAF.\n\nIt can be easily reproduce with add some delay in [3] - [6].\n\nOnly sync call has the problem since async call\u0027s callback is\nexecuted in cifsd process.\n\nAdd an extra state to mark the mid state to READY before wakeup the\nwaitter, then it can get the resp safely.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52572",
          "url": "https://www.suse.com/security/cve/CVE-2023-52572"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220946 for CVE-2023-52572",
          "url": "https://bugzilla.suse.com/1220946"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52572"
    },
    {
      "cve": "CVE-2023-52646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naio: fix mremap after fork null-deref\n\nCommit e4a0d3e720e7 (\"aio: Make it possible to remap aio ring\") introduced\na null-deref if mremap is called on an old aio mapping after fork as\nmm-\u003eioctx_table will be set to NULL.\n\n[jmoyer@redhat.com: fix 80 column issue]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52646",
          "url": "https://www.suse.com/security/cve/CVE-2023-52646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223432 for CVE-2023-52646",
          "url": "https://bugzilla.suse.com/1223432"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52646"
    },
    {
      "cve": "CVE-2023-52653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix a memleak in gss_import_v2_context\n\nThe ctx-\u003emech_used.data allocated by kmemdup is not freed in neither\ngss_import_v2_context nor it only caller gss_krb5_import_sec_context,\nwhich frees ctx on error.\n\nThus, this patch reform the last call of gss_import_v2_context to the\ngss_krb5_import_ctx_v2, preventing the memleak while keepping the return\nformation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52653",
          "url": "https://www.suse.com/security/cve/CVE-2023-52653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223712 for CVE-2023-52653",
          "url": "https://bugzilla.suse.com/1223712"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52653"
    },
    {
      "cve": "CVE-2023-52853",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52853"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhid: cp2112: Fix duplicate workqueue initialization\n\nPreviously the cp2112 driver called INIT_DELAYED_WORK within\ncp2112_gpio_irq_startup, resulting in duplicate initilizations of the\nworkqueue on subsequent IRQ startups following an initial request. This\nresulted in a warning in set_work_data in workqueue.c, as well as a rare\nNULL dereference within process_one_work in workqueue.c.\n\nInitialize the workqueue within _probe instead.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52853",
          "url": "https://www.suse.com/security/cve/CVE-2023-52853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224988 for CVE-2023-52853",
          "url": "https://bugzilla.suse.com/1224988"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52853"
    },
    {
      "cve": "CVE-2023-52924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: don\u0027t skip expired elements during walk\n\nThere is an asymmetry between commit/abort and preparation phase if the\nfollowing conditions are met:\n\n1. set is a verdict map (\"1.2.3.4 : jump foo\")\n2. timeouts are enabled\n\nIn this case, following sequence is problematic:\n\n1. element E in set S refers to chain C\n2. userspace requests removal of set S\n3. kernel does a set walk to decrement chain-\u003euse count for all elements\n   from preparation phase\n4. kernel does another set walk to remove elements from the commit phase\n   (or another walk to do a chain-\u003euse increment for all elements from\n    abort phase)\n\nIf E has already expired in 1), it will be ignored during list walk, so its use count\nwon\u0027t have been changed.\n\nThen, when set is culled, -\u003edestroy callback will zap the element via\nnf_tables_set_elem_destroy(), but this function is only safe for\nelements that have been deactivated earlier from the preparation phase:\nlack of earlier deactivate removes the element but leaks the chain use\ncount, which results in a WARN splat when the chain gets removed later,\nplus a leak of the nft_chain structure.\n\nUpdate pipapo_get() not to skip expired elements, otherwise flush\ncommand reports bogus ENOENT errors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52924",
          "url": "https://www.suse.com/security/cve/CVE-2023-52924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236821 for CVE-2023-52924",
          "url": "https://bugzilla.suse.com/1236821"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 1.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52924"
    },
    {
      "cve": "CVE-2023-6606",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-6606"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-6606",
          "url": "https://www.suse.com/security/cve/CVE-2023-6606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217947 for CVE-2023-6606",
          "url": "https://bugzilla.suse.com/1217947"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-6606",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-6606"
    },
    {
      "cve": "CVE-2024-23307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23307",
          "url": "https://www.suse.com/security/cve/CVE-2024-23307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219169 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1219169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220145 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1220145"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-23307"
    },
    {
      "cve": "CVE-2024-26810",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26810"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Lock external INTx masking ops\n\nMask operations through config space changes to DisINTx may race INTx\nconfiguration changes via ioctl.  Create wrappers that add locking for\npaths outside of the core interrupt code.\n\nIn particular, irq_type is updated holding igate, therefore testing\nis_intx() requires holding igate.  For example clearing DisINTx from\nconfig space can otherwise race changes of the interrupt configuration.\n\nThis aligns interfaces which may trigger the INTx eventfd into two\ncamps, one side serialized by igate and the other only enabled while\nINTx is configured.  A subsequent patch introduces synchronization for\nthe latter flows.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26810",
          "url": "https://www.suse.com/security/cve/CVE-2024-26810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222803 for CVE-2024-26810",
          "url": "https://bugzilla.suse.com/1222803"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26810"
    },
    {
      "cve": "CVE-2024-26929",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26929"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26929",
          "url": "https://www.suse.com/security/cve/CVE-2024-26929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223715 for CVE-2024-26929",
          "url": "https://bugzilla.suse.com/1223715"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223716 for CVE-2024-26929",
          "url": "https://bugzilla.suse.com/1223716"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26929"
    },
    {
      "cve": "CVE-2024-26930",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26930"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix double free of the ha-\u003evp_map pointer\n\nCoverity scan reported potential risk of double free of the pointer\nha-\u003evp_map.  ha-\u003evp_map was freed in qla2x00_mem_alloc(), and again freed\nin function qla2x00_mem_free(ha).\n\nAssign NULL to vp_map and kfree take care of NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26930",
          "url": "https://www.suse.com/security/cve/CVE-2024-26930"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223626 for CVE-2024-26930",
          "url": "https://bugzilla.suse.com/1223626"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223681 for CVE-2024-26930",
          "url": "https://bugzilla.suse.com/1223681"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26930"
    },
    {
      "cve": "CVE-2024-26931",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26931"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix command flush on cable pull\n\nSystem crash due to command failed to flush back to SCSI layer.\n\n BUG: unable to handle kernel NULL pointer dereference at 0000000000000000\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP NOPTI\n CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-372.9.1.el8.x86_64 #1\n Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021\n Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc]\n RIP: 0010:__wake_up_common+0x4c/0x190\n Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 \u003c49\u003e 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75\n RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086\n RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320\n RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8\n R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20\n R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000\n FS:  0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n  __wake_up_common_lock+0x7c/0xc0\n  qla_nvme_ls_req+0x355/0x4c0 [qla2xxx]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0\n ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc]\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200.\n  ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc]\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1\n ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0\n  ? __switch_to+0x10c/0x450\n ? process_one_work+0x1a7/0x360\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201.\n  ? worker_thread+0x1ce/0x390\n  ? create_worker+0x1a0/0x1a0\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70\n  ? kthread+0x10a/0x120\n qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8\n  ? set_kthread_struct+0x40/0x40\n qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed.\n  ? ret_from_fork+0x1f/0x40\n qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout\n\nThe system was under memory stress where driver was not able to allocate an\nSRB to carry out error recovery of cable pull.  The failure to flush causes\nupper layer to start modifying scsi_cmnd.  When the system frees up some\nmemory, the subsequent cable pull trigger another command flush. At this\npoint the driver access a null pointer when attempting to DMA unmap the\nSGL.\n\nAdd a check to make sure commands are flush back on session tear down to\nprevent the null pointer access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26931",
          "url": "https://www.suse.com/security/cve/CVE-2024-26931"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223627 for CVE-2024-26931",
          "url": "https://bugzilla.suse.com/1223627"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26931"
    },
    {
      "cve": "CVE-2024-27054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix double module refcount decrement\n\nOnce the discipline is associated with the device, deleting the device\ntakes care of decrementing the module\u0027s refcount.  Doing it manually on\nthis error path causes refcount to artificially decrease on each error\nwhile it should just stay the same.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27054",
          "url": "https://www.suse.com/security/cve/CVE-2024-27054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223819 for CVE-2024-27054",
          "url": "https://bugzilla.suse.com/1223819"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27054"
    },
    {
      "cve": "CVE-2024-27388",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27388"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix some memleaks in gssx_dec_option_array\n\nThe creds and oa-\u003edata need to be freed in the error-handling paths after\ntheir allocation. So this patch add these deallocations in the\ncorresponding paths.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27388",
          "url": "https://www.suse.com/security/cve/CVE-2024-27388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223744 for CVE-2024-27388",
          "url": "https://bugzilla.suse.com/1223744"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27388"
    },
    {
      "cve": "CVE-2024-27397",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27397"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: use timestamp to check for set element timeout\n\nAdd a timestamp field at the beginning of the transaction, store it\nin the nftables per-netns area.\n\nUpdate set backend .insert, .deactivate and sync gc path to use the\ntimestamp, this avoids that an element expires while control plane\ntransaction is still unfinished.\n\n.lookup and .update, which are used from packet path, still use the\ncurrent time to check if the element has expired. And .get path and dump\nalso since this runs lockless under rcu read size lock. Then, there is\nasync gc which also needs to check the current time since it runs\nasynchronously from a workqueue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27397",
          "url": "https://www.suse.com/security/cve/CVE-2024-27397"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224095 for CVE-2024-27397",
          "url": "https://bugzilla.suse.com/1224095"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27397"
    },
    {
      "cve": "CVE-2024-47701",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-47701"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid OOB when system.data xattr changes underneath the filesystem\n\nWhen looking up for an entry in an inlined directory, if e_value_offs is\nchanged underneath the filesystem by some change in the block device, it\nwill lead to an out-of-bounds access that KASAN detects as an UAF.\n\nEXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.\nloop0: detected capacity change from 2048 to 2047\n==================================================================\nBUG: KASAN: use-after-free in ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500\nRead of size 1 at addr ffff88803e91130f by task syz-executor269/5103\n\nCPU: 0 UID: 0 PID: 5103 Comm: syz-executor269 Not tainted 6.11.0-rc4-syzkaller #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:93 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500\n ext4_find_inline_entry+0x4be/0x5e0 fs/ext4/inline.c:1697\n __ext4_find_entry+0x2b4/0x1b30 fs/ext4/namei.c:1573\n ext4_lookup_entry fs/ext4/namei.c:1727 [inline]\n ext4_lookup+0x15f/0x750 fs/ext4/namei.c:1795\n lookup_one_qstr_excl+0x11f/0x260 fs/namei.c:1633\n filename_create+0x297/0x540 fs/namei.c:3980\n do_symlinkat+0xf9/0x3a0 fs/namei.c:4587\n __do_sys_symlinkat fs/namei.c:4610 [inline]\n __se_sys_symlinkat fs/namei.c:4607 [inline]\n __x64_sys_symlinkat+0x95/0xb0 fs/namei.c:4607\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f3e73ced469\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff4d40c258 EFLAGS: 00000246 ORIG_RAX: 000000000000010a\nRAX: ffffffffffffffda RBX: 0032656c69662f2e RCX: 00007f3e73ced469\nRDX: 0000000020000200 RSI: 00000000ffffff9c RDI: 00000000200001c0\nRBP: 0000000000000000 R08: 00007fff4d40c290 R09: 00007fff4d40c290\nR10: 0023706f6f6c2f76 R11: 0000000000000246 R12: 00007fff4d40c27c\nR13: 0000000000000003 R14: 431bde82d7b634db R15: 00007fff4d40c2b0\n \u003c/TASK\u003e\n\nCalling ext4_xattr_ibody_find right after reading the inode with\next4_get_inode_loc will lead to a check of the validity of the xattrs,\navoiding this problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-47701",
          "url": "https://www.suse.com/security/cve/CVE-2024-47701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225742 for CVE-2024-47701",
          "url": "https://bugzilla.suse.com/1225742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1231920 for CVE-2024-47701",
          "url": "https://bugzilla.suse.com/1231920"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-47701"
    },
    {
      "cve": "CVE-2024-49867",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49867"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: wait for fixup workers before stopping cleaner kthread during umount\n\nDuring unmount, at close_ctree(), we have the following steps in this order:\n\n1) Park the cleaner kthread - this doesn\u0027t destroy the kthread, it basically\n   halts its execution (wake ups against it work but do nothing);\n\n2) We stop the cleaner kthread - this results in freeing the respective\n   struct task_struct;\n\n3) We call btrfs_stop_all_workers() which waits for any jobs running in all\n   the work queues and then free the work queues.\n\nSyzbot reported a case where a fixup worker resulted in a crash when doing\na delayed iput on its inode while attempting to wake up the cleaner at\nbtrfs_add_delayed_iput(), because the task_struct of the cleaner kthread\nwas already freed. This can happen during unmount because we don\u0027t wait\nfor any fixup workers still running before we call kthread_stop() against\nthe cleaner kthread, which stops and free all its resources.\n\nFix this by waiting for any fixup workers at close_ctree() before we call\nkthread_stop() against the cleaner and run pending delayed iputs.\n\nThe stack traces reported by syzbot were the following:\n\n  BUG: KASAN: slab-use-after-free in __lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065\n  Read of size 8 at addr ffff8880272a8a18 by task kworker/u8:3/52\n\n  CPU: 1 UID: 0 PID: 52 Comm: kworker/u8:3 Not tainted 6.12.0-rc1-syzkaller #0\n  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\n  Workqueue: btrfs-fixup btrfs_work_helper\n  Call Trace:\n   \u003cTASK\u003e\n   __dump_stack lib/dump_stack.c:94 [inline]\n   dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n   print_address_description mm/kasan/report.c:377 [inline]\n   print_report+0x169/0x550 mm/kasan/report.c:488\n   kasan_report+0x143/0x180 mm/kasan/report.c:601\n   __lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065\n   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825\n   __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]\n   _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162\n   class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:551 [inline]\n   try_to_wake_up+0xb0/0x1480 kernel/sched/core.c:4154\n   btrfs_writepage_fixup_worker+0xc16/0xdf0 fs/btrfs/inode.c:2842\n   btrfs_work_helper+0x390/0xc50 fs/btrfs/async-thread.c:314\n   process_one_work kernel/workqueue.c:3229 [inline]\n   process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310\n   worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n   kthread+0x2f0/0x390 kernel/kthread.c:389\n   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n   \u003c/TASK\u003e\n\n  Allocated by task 2:\n   kasan_save_stack mm/kasan/common.c:47 [inline]\n   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n   unpoison_slab_object mm/kasan/common.c:319 [inline]\n   __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345\n   kasan_slab_alloc include/linux/kasan.h:247 [inline]\n   slab_post_alloc_hook mm/slub.c:4086 [inline]\n   slab_alloc_node mm/slub.c:4135 [inline]\n   kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4187\n   alloc_task_struct_node kernel/fork.c:180 [inline]\n   dup_task_struct+0x57/0x8c0 kernel/fork.c:1107\n   copy_process+0x5d1/0x3d50 kernel/fork.c:2206\n   kernel_clone+0x223/0x880 kernel/fork.c:2787\n   kernel_thread+0x1bc/0x240 kernel/fork.c:2849\n   create_kthread kernel/kthread.c:412 [inline]\n   kthreadd+0x60d/0x810 kernel/kthread.c:765\n   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\n  Freed by task 61:\n   kasan_save_stack mm/kasan/common.c:47 [inline]\n   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n   kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579\n   poison_slab_object mm/kasan/common.c:247 [inline]\n   __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n   kasan_slab_free include/linux/kasan.h:230 [inline]\n   slab_free_h\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49867",
          "url": "https://www.suse.com/security/cve/CVE-2024-49867"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232262 for CVE-2024-49867",
          "url": "https://bugzilla.suse.com/1232262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232271 for CVE-2024-49867",
          "url": "https://bugzilla.suse.com/1232271"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-49867"
    },
    {
      "cve": "CVE-2024-49884",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49884"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix slab-use-after-free in ext4_split_extent_at()\n\nWe hit the following use-after-free:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in ext4_split_extent_at+0xba8/0xcc0\nRead of size 2 at addr ffff88810548ed08 by task kworker/u20:0/40\nCPU: 0 PID: 40 Comm: kworker/u20:0 Not tainted 6.9.0-dirty #724\nCall Trace:\n \u003cTASK\u003e\n kasan_report+0x93/0xc0\n ext4_split_extent_at+0xba8/0xcc0\n ext4_split_extent.isra.0+0x18f/0x500\n ext4_split_convert_extents+0x275/0x750\n ext4_ext_handle_unwritten_extents+0x73e/0x1580\n ext4_ext_map_blocks+0xe20/0x2dc0\n ext4_map_blocks+0x724/0x1700\n ext4_do_writepages+0x12d6/0x2a70\n[...]\n\nAllocated by task 40:\n __kmalloc_noprof+0x1ac/0x480\n ext4_find_extent+0xf3b/0x1e70\n ext4_ext_map_blocks+0x188/0x2dc0\n ext4_map_blocks+0x724/0x1700\n ext4_do_writepages+0x12d6/0x2a70\n[...]\n\nFreed by task 40:\n kfree+0xf1/0x2b0\n ext4_find_extent+0xa71/0x1e70\n ext4_ext_insert_extent+0xa22/0x3260\n ext4_split_extent_at+0x3ef/0xcc0\n ext4_split_extent.isra.0+0x18f/0x500\n ext4_split_convert_extents+0x275/0x750\n ext4_ext_handle_unwritten_extents+0x73e/0x1580\n ext4_ext_map_blocks+0xe20/0x2dc0\n ext4_map_blocks+0x724/0x1700\n ext4_do_writepages+0x12d6/0x2a70\n[...]\n==================================================================\n\nThe flow of issue triggering is as follows:\n\next4_split_extent_at\n  path = *ppath\n  ext4_ext_insert_extent(ppath)\n    ext4_ext_create_new_leaf(ppath)\n      ext4_find_extent(orig_path)\n        path = *orig_path\n        read_extent_tree_block\n          // return -ENOMEM or -EIO\n        ext4_free_ext_path(path)\n          kfree(path)\n        *orig_path = NULL\n  a. If err is -ENOMEM:\n  ext4_ext_dirty(path + path-\u003ep_depth)\n  // path use-after-free !!!\n  b. If err is -EIO and we have EXT_DEBUG defined:\n  ext4_ext_show_leaf(path)\n    eh = path[depth].p_hdr\n    // path also use-after-free !!!\n\nSo when trying to zeroout or fix the extent length, call ext4_find_extent()\nto update the path.\n\nIn addition we use *ppath directly as an ext4_ext_show_leaf() input to\navoid possible use-after-free when EXT_DEBUG is defined, and to avoid\nunnecessary path updates.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49884",
          "url": "https://www.suse.com/security/cve/CVE-2024-49884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225742 for CVE-2024-49884",
          "url": "https://bugzilla.suse.com/1225742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232198 for CVE-2024-49884",
          "url": "https://bugzilla.suse.com/1232198"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-49884"
    },
    {
      "cve": "CVE-2024-49950",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49950"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix uaf in l2cap_connect\n\n[Syzbot reported]\nBUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949\nRead of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54\n\nCPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\nWorkqueue: hci2 hci_rx_work\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:93 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc3/0x620 mm/kasan/report.c:488\n kasan_report+0xd9/0x110 mm/kasan/report.c:601\n l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949\n l2cap_connect_req net/bluetooth/l2cap_core.c:4080 [inline]\n l2cap_bredr_sig_cmd net/bluetooth/l2cap_core.c:4772 [inline]\n l2cap_sig_channel net/bluetooth/l2cap_core.c:5543 [inline]\n l2cap_recv_frame+0xf0b/0x8eb0 net/bluetooth/l2cap_core.c:6825\n l2cap_recv_acldata+0x9b4/0xb70 net/bluetooth/l2cap_core.c:7514\n hci_acldata_packet net/bluetooth/hci_core.c:3791 [inline]\n hci_rx_work+0xaab/0x1610 net/bluetooth/hci_core.c:4028\n process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231\n process_scheduled_works kernel/workqueue.c:3312 [inline]\n worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n...\n\nFreed by task 5245:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579\n poison_slab_object+0xf7/0x160 mm/kasan/common.c:240\n __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256\n kasan_slab_free include/linux/kasan.h:184 [inline]\n slab_free_hook mm/slub.c:2256 [inline]\n slab_free mm/slub.c:4477 [inline]\n kfree+0x12a/0x3b0 mm/slub.c:4598\n l2cap_conn_free net/bluetooth/l2cap_core.c:1810 [inline]\n kref_put include/linux/kref.h:65 [inline]\n l2cap_conn_put net/bluetooth/l2cap_core.c:1822 [inline]\n l2cap_conn_del+0x59d/0x730 net/bluetooth/l2cap_core.c:1802\n l2cap_connect_cfm+0x9e6/0xf80 net/bluetooth/l2cap_core.c:7241\n hci_connect_cfm include/net/bluetooth/hci_core.h:1960 [inline]\n hci_conn_failed+0x1c3/0x370 net/bluetooth/hci_conn.c:1265\n hci_abort_conn_sync+0x75a/0xb50 net/bluetooth/hci_sync.c:5583\n abort_conn_sync+0x197/0x360 net/bluetooth/hci_conn.c:2917\n hci_cmd_sync_work+0x1a4/0x410 net/bluetooth/hci_sync.c:328\n process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231\n process_scheduled_works kernel/workqueue.c:3312 [inline]\n worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49950",
          "url": "https://www.suse.com/security/cve/CVE-2024-49950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225742 for CVE-2024-49950",
          "url": "https://bugzilla.suse.com/1225742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232159 for CVE-2024-49950",
          "url": "https://bugzilla.suse.com/1232159"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-49950"
    },
    {
      "cve": "CVE-2024-49963",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49963"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: bcm2835: Fix timeout during suspend mode\n\nDuring noirq suspend phase the Raspberry Pi power driver suffer of\nfirmware property timeouts. The reason is that the IRQ of the underlying\nBCM2835 mailbox is disabled and rpi_firmware_property_list() will always\nrun into a timeout [1].\n\nSince the VideoCore side isn\u0027t consider as a wakeup source, set the\nIRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled\nduring suspend-resume cycle.\n\n[1]\nPM: late suspend of devices complete after 1.754 msecs\nWARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128\n rpi_firmware_property_list+0x204/0x22c\nFirmware transaction 0x00028001 timeout\nModules linked in:\nCPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17\nHardware name: BCM2835\nCall trace:\nunwind_backtrace from show_stack+0x18/0x1c\nshow_stack from dump_stack_lvl+0x34/0x44\ndump_stack_lvl from __warn+0x88/0xec\n__warn from warn_slowpath_fmt+0x7c/0xb0\nwarn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c\nrpi_firmware_property_list from rpi_firmware_property+0x68/0x8c\nrpi_firmware_property from rpi_firmware_set_power+0x54/0xc0\nrpi_firmware_set_power from _genpd_power_off+0xe4/0x148\n_genpd_power_off from genpd_sync_power_off+0x7c/0x11c\ngenpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0\ngenpd_finish_suspend from dpm_run_callback+0x78/0xd0\ndpm_run_callback from device_suspend_noirq+0xc0/0x238\ndevice_suspend_noirq from dpm_suspend_noirq+0xb0/0x168\ndpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac\nsuspend_devices_and_enter from pm_suspend+0x254/0x2e4\npm_suspend from state_store+0xa8/0xd4\nstate_store from kernfs_fop_write_iter+0x154/0x1a0\nkernfs_fop_write_iter from vfs_write+0x12c/0x184\nvfs_write from ksys_write+0x78/0xc0\nksys_write from ret_fast_syscall+0x0/0x54\nException stack(0xcc93dfa8 to 0xcc93dff0)\n[...]\nPM: noirq suspend of devices complete after 3095.584 msecs",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49963",
          "url": "https://www.suse.com/security/cve/CVE-2024-49963"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232147 for CVE-2024-49963",
          "url": "https://bugzilla.suse.com/1232147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-49963"
    },
    {
      "cve": "CVE-2024-49975",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49975"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuprobes: fix kernel info leak via \"[uprobes]\" vma\n\nxol_add_vma() maps the uninitialized page allocated by __create_xol_area()\ninto userspace. On some architectures (x86) this memory is readable even\nwithout VM_READ, VM_EXEC results in the same pgprot_t as VM_EXEC|VM_READ,\nalthough this doesn\u0027t really matter, debugger can read this memory anyway.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49975",
          "url": "https://www.suse.com/security/cve/CVE-2024-49975"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232104 for CVE-2024-49975",
          "url": "https://bugzilla.suse.com/1232104"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-49975"
    },
    {
      "cve": "CVE-2024-50036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-50036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not delay dst_entries_add() in dst_release()\n\ndst_entries_add() uses per-cpu data that might be freed at netns\ndismantle from ip6_route_net_exit() calling dst_entries_destroy()\n\nBefore ip6_route_net_exit() can be called, we release all\nthe dsts associated with this netns, via calls to dst_release(),\nwhich waits an rcu grace period before calling dst_destroy()\n\ndst_entries_add() use in dst_destroy() is racy, because\ndst_entries_destroy() could have been called already.\n\nDecrementing the number of dsts must happen sooner.\n\nNotes:\n\n1) in CONFIG_XFRM case, dst_destroy() can call\n   dst_release_immediate(child), this might also cause UAF\n   if the child does not have DST_NOCOUNT set.\n   IPSEC maintainers might take a look and see how to address this.\n\n2) There is also discussion about removing this count of dst,\n   which might happen in future kernels.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-50036",
          "url": "https://www.suse.com/security/cve/CVE-2024-50036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1231912 for CVE-2024-50036",
          "url": "https://bugzilla.suse.com/1231912"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-50036"
    },
    {
      "cve": "CVE-2024-50067",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-50067"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuprobe: avoid out-of-bounds memory access of fetching args\n\nUprobe needs to fetch args into a percpu buffer, and then copy to ring\nbuffer to avoid non-atomic context problem.\n\nSometimes user-space strings, arrays can be very large, but the size of\npercpu buffer is only page size. And store_trace_args() won\u0027t check\nwhether these data exceeds a single page or not, caused out-of-bounds\nmemory access.\n\nIt could be reproduced by following steps:\n1. build kernel with CONFIG_KASAN enabled\n2. save follow program as test.c\n\n```\n\\#include \u003cstdio.h\u003e\n\\#include \u003cstdlib.h\u003e\n\\#include \u003cstring.h\u003e\n\n// If string length large than MAX_STRING_SIZE, the fetch_store_strlen()\n// will return 0, cause __get_data_size() return shorter size, and\n// store_trace_args() will not trigger out-of-bounds access.\n// So make string length less than 4096.\n\\#define STRLEN 4093\n\nvoid generate_string(char *str, int n)\n{\n    int i;\n    for (i = 0; i \u003c n; ++i)\n    {\n        char c = i % 26 + \u0027a\u0027;\n        str[i] = c;\n    }\n    str[n-1] = \u0027\\0\u0027;\n}\n\nvoid print_string(char *str)\n{\n    printf(\"%s\\n\", str);\n}\n\nint main()\n{\n    char tmp[STRLEN];\n\n    generate_string(tmp, STRLEN);\n    print_string(tmp);\n\n    return 0;\n}\n```\n3. compile program\n`gcc -o test test.c`\n\n4. get the offset of `print_string()`\n```\nobjdump -t test | grep -w print_string\n0000000000401199 g     F .text  000000000000001b              print_string\n```\n\n5. configure uprobe with offset 0x1199\n```\noff=0x1199\n\ncd /sys/kernel/debug/tracing/\necho \"p /root/test:${off} arg1=+0(%di):ustring arg2=\\$comm arg3=+0(%di):ustring\"\n \u003e uprobe_events\necho 1 \u003e events/uprobes/enable\necho 1 \u003e tracing_on\n```\n\n6. run `test`, and kasan will report error.\n==================================================================\nBUG: KASAN: use-after-free in strncpy_from_user+0x1d6/0x1f0\nWrite of size 8 at addr ffff88812311c004 by task test/499CPU: 0 UID: 0 PID: 499 Comm: test Not tainted 6.12.0-rc3+ #18\nHardware name: Red Hat KVM, BIOS 1.16.0-4.al8 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x55/0x70\n print_address_description.constprop.0+0x27/0x310\n kasan_report+0x10f/0x120\n ? strncpy_from_user+0x1d6/0x1f0\n strncpy_from_user+0x1d6/0x1f0\n ? rmqueue.constprop.0+0x70d/0x2ad0\n process_fetch_insn+0xb26/0x1470\n ? __pfx_process_fetch_insn+0x10/0x10\n ? _raw_spin_lock+0x85/0xe0\n ? __pfx__raw_spin_lock+0x10/0x10\n ? __pte_offset_map+0x1f/0x2d0\n ? unwind_next_frame+0xc5f/0x1f80\n ? arch_stack_walk+0x68/0xf0\n ? is_bpf_text_address+0x23/0x30\n ? kernel_text_address.part.0+0xbb/0xd0\n ? __kernel_text_address+0x66/0xb0\n ? unwind_get_return_address+0x5e/0xa0\n ? __pfx_stack_trace_consume_entry+0x10/0x10\n ? arch_stack_walk+0xa2/0xf0\n ? _raw_spin_lock_irqsave+0x8b/0xf0\n ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n ? depot_alloc_stack+0x4c/0x1f0\n ? _raw_spin_unlock_irqrestore+0xe/0x30\n ? stack_depot_save_flags+0x35d/0x4f0\n ? kasan_save_stack+0x34/0x50\n ? kasan_save_stack+0x24/0x50\n ? mutex_lock+0x91/0xe0\n ? __pfx_mutex_lock+0x10/0x10\n prepare_uprobe_buffer.part.0+0x2cd/0x500\n uprobe_dispatcher+0x2c3/0x6a0\n ? __pfx_uprobe_dispatcher+0x10/0x10\n ? __kasan_slab_alloc+0x4d/0x90\n handler_chain+0xdd/0x3e0\n handle_swbp+0x26e/0x3d0\n ? __pfx_handle_swbp+0x10/0x10\n ? uprobe_pre_sstep_notifier+0x151/0x1b0\n irqentry_exit_to_user_mode+0xe2/0x1b0\n asm_exc_int3+0x39/0x40\nRIP: 0033:0x401199\nCode: 01 c2 0f b6 45 fb 88 02 83 45 fc 01 8b 45 fc 3b 45 e4 7c b7 8b 45 e4 48 98 48 8d 50 ff 48 8b 45 e8 48 01 d0 ce\nRSP: 002b:00007ffdf00576a8 EFLAGS: 00000206\nRAX: 00007ffdf00576b0 RBX: 0000000000000000 RCX: 0000000000000ff2\nRDX: 0000000000000ffc RSI: 0000000000000ffd RDI: 00007ffdf00576b0\nRBP: 00007ffdf00586b0 R08: 00007feb2f9c0d20 R09: 00007feb2f9c0d20\nR10: 0000000000000001 R11: 0000000000000202 R12: 0000000000401040\nR13: 00007ffdf0058780 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\n\nThis commit enforces the buffer\u0027s maxlen less than a page-size to avoid\nstore_trace_args() out-of-memory access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-50067",
          "url": "https://www.suse.com/security/cve/CVE-2024-50067"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232416 for CVE-2024-50067",
          "url": "https://bugzilla.suse.com/1232416"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-50067"
    },
    {
      "cve": "CVE-2024-50073",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-50073"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: Fix use-after-free in gsm_cleanup_mux\n\nBUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0\ndrivers/tty/n_gsm.c:3160 [n_gsm]\nRead of size 8 at addr ffff88815fe99c00 by task poc/3379\nCPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56\nHardware name: VMware, Inc. VMware Virtual Platform/440BX\nDesktop Reference Platform, BIOS 6.00 11/12/2020\nCall Trace:\n \u003cTASK\u003e\n gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]\n __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]\n __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389\n update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500\n __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846\n __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161\n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]\n _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107\n __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]\n ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195\n ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79\n __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338\n __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805\n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818\n\nAllocated by task 65:\n gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]\n gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]\n gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]\n gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]\n tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391\n tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39\n flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445\n process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229\n worker_thread+0x3dc/0x950 kernel/workqueue.c:3391\n kthread+0x2a3/0x370 kernel/kthread.c:389\n ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257\n\nFreed by task 3367:\n kfree+0x126/0x420 mm/slub.c:4580\n gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]\n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]\n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818\n\n[Analysis]\ngsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux\ncan be freed by multi threads through ioctl,which leads\nto the occurrence of uaf. Protect it by gsm tx lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-50073",
          "url": "https://www.suse.com/security/cve/CVE-2024-50073"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225742 for CVE-2024-50073",
          "url": "https://bugzilla.suse.com/1225742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232520 for CVE-2024-50073",
          "url": "https://bugzilla.suse.com/1232520"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-50073"
    },
    {
      "cve": "CVE-2024-50115",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-50115"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory\n\nIgnore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits\n4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn\u0027t\nenforce 32-byte alignment of nCR3.\n\nIn the absolute worst case scenario, failure to ignore bits 4:0 can result\nin an out-of-bounds read, e.g. if the target page is at the end of a\nmemslot, and the VMM isn\u0027t using guard pages.\n\nPer the APM:\n\n  The CR3 register points to the base address of the page-directory-pointer\n  table. The page-directory-pointer table is aligned on a 32-byte boundary,\n  with the low 5 address bits 4:0 assumed to be 0.\n\nAnd the SDM\u0027s much more explicit:\n\n  4:0    Ignored\n\nNote, KVM gets this right when loading PDPTRs, it\u0027s only the nSVM flow\nthat is broken.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-50115",
          "url": "https://www.suse.com/security/cve/CVE-2024-50115"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225742 for CVE-2024-50115",
          "url": "https://bugzilla.suse.com/1225742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232919 for CVE-2024-50115",
          "url": "https://bugzilla.suse.com/1232919"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233019 for CVE-2024-50115",
          "url": "https://bugzilla.suse.com/1233019"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-50115"
    },
    {
      "cve": "CVE-2024-50251",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-50251"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: sanitize offset and length before calling skb_checksum()\n\nIf access to offset + length is larger than the skbuff length, then\nskb_checksum() triggers BUG_ON().\n\nskb_checksum() internally subtracts the length parameter while iterating\nover skbuff, BUG_ON(len) at the end of it checks that the expected\nlength to be included in the checksum calculation is fully consumed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-50251",
          "url": "https://www.suse.com/security/cve/CVE-2024-50251"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233248 for CVE-2024-50251",
          "url": "https://bugzilla.suse.com/1233248"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-50251"
    },
    {
      "cve": "CVE-2024-50304",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-50304"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()\n\nThe per-netns IP tunnel hash table is protected by the RTNL mutex and\nip_tunnel_find() is only called from the control path where the mutex is\ntaken.\n\nAdd a lockdep expression to hlist_for_each_entry_rcu() in\nip_tunnel_find() in order to validate that the mutex is held and to\nsilence the suspicious RCU usage warning [1].\n\n[1]\nWARNING: suspicious RCU usage\n6.12.0-rc3-custom-gd95d9a31aceb #139 Not tainted\n-----------------------------\nnet/ipv4/ip_tunnel.c:221 RCU-list traversed in non-reader section!!\n\nother info that might help us debug this:\n\nrcu_scheduler_active = 2, debug_locks = 1\n1 lock held by ip/362:\n #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60\n\nstack backtrace:\nCPU: 12 UID: 0 PID: 362 Comm: ip Not tainted 6.12.0-rc3-custom-gd95d9a31aceb #139\nHardware name: Bochs Bochs, BIOS Bochs 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xba/0x110\n lockdep_rcu_suspicious.cold+0x4f/0xd6\n ip_tunnel_find+0x435/0x4d0\n ip_tunnel_newlink+0x517/0x7a0\n ipgre_newlink+0x14c/0x170\n __rtnl_newlink+0x1173/0x19c0\n rtnl_newlink+0x6c/0xa0\n rtnetlink_rcv_msg+0x3cc/0xf60\n netlink_rcv_skb+0x171/0x450\n netlink_unicast+0x539/0x7f0\n netlink_sendmsg+0x8c1/0xd80\n ____sys_sendmsg+0x8f9/0xc20\n ___sys_sendmsg+0x197/0x1e0\n __sys_sendmsg+0x122/0x1f0\n do_syscall_64+0xbb/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-50304",
          "url": "https://www.suse.com/security/cve/CVE-2024-50304"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233522 for CVE-2024-50304",
          "url": "https://bugzilla.suse.com/1233522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-50304"
    },
    {
      "cve": "CVE-2024-53173",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53173"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53173",
          "url": "https://www.suse.com/security/cve/CVE-2024-53173"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234853 for CVE-2024-53173",
          "url": "https://bugzilla.suse.com/1234853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234891 for CVE-2024-53173",
          "url": "https://bugzilla.suse.com/1234891"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234892 for CVE-2024-53173",
          "url": "https://bugzilla.suse.com/1234892"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53173"
    },
    {
      "cve": "CVE-2024-53217",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53217"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent NULL dereference in nfsd4_process_cb_update()\n\n@ses is initialized to NULL. If __nfsd4_find_backchannel() finds no\navailable backchannel session, setup_callback_client() will try to\ndereference @ses and segfault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53217",
          "url": "https://www.suse.com/security/cve/CVE-2024-53217"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234999 for CVE-2024-53217",
          "url": "https://bugzilla.suse.com/1234999"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-53217"
    },
    {
      "cve": "CVE-2024-53239",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53239"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: 6fire: Release resources at card release\n\nThe current 6fire code tries to release the resources right after the\ncall of usb6fire_chip_abort().  But at this moment, the card object\nmight be still in use (as we\u0027re calling snd_card_free_when_closed()).\n\nFor avoid potential UAFs, move the release of resources to the card\u0027s\nprivate_free instead of the manual call of usb6fire_chip_destroy() at\nthe USB disconnect callback.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53239",
          "url": "https://www.suse.com/security/cve/CVE-2024-53239"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234853 for CVE-2024-53239",
          "url": "https://bugzilla.suse.com/1234853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235054 for CVE-2024-53239",
          "url": "https://bugzilla.suse.com/1235054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235055 for CVE-2024-53239",
          "url": "https://bugzilla.suse.com/1235055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53239"
    },
    {
      "cve": "CVE-2024-56539",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56539"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()\n\nReplace one-element array with a flexible-array member in `struct\nmwifiex_ie_types_wildcard_ssid_params` to fix the following warning\non a MT8173 Chromebook (mt8173-elm-hana):\n\n[  356.775250] ------------[ cut here ]------------\n[  356.784543] memcpy: detected field-spanning write (size 6) of single field \"wildcard_ssid_tlv-\u003essid\" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1)\n[  356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex]\n\nThe \"(size 6)\" above is exactly the length of the SSID of the network\nthis device was connected to. The source of the warning looks like:\n\n    ssid_len = user_scan_in-\u003essid_list[i].ssid_len;\n    [...]\n    memcpy(wildcard_ssid_tlv-\u003essid,\n           user_scan_in-\u003essid_list[i].ssid, ssid_len);\n\nThere is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this\nstruct, but it already didn\u0027t account for the size of the one-element\narray, so it doesn\u0027t need to be changed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56539",
          "url": "https://www.suse.com/security/cve/CVE-2024-56539"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234853 for CVE-2024-56539",
          "url": "https://bugzilla.suse.com/1234853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234963 for CVE-2024-56539",
          "url": "https://bugzilla.suse.com/1234963"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234964 for CVE-2024-56539",
          "url": "https://bugzilla.suse.com/1234964"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-56539"
    },
    {
      "cve": "CVE-2024-56548",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56548"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: don\u0027t query the device logical block size multiple times\n\nDevices block sizes may change. One of these cases is a loop device by\nusing ioctl LOOP_SET_BLOCK_SIZE.\n\nWhile this may cause other issues like IO being rejected, in the case of\nhfsplus, it will allocate a block by using that size and potentially write\nout-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the\nlatter function reads a different io_size.\n\nUsing a new min_io_size initally set to sb_min_blocksize works for the\npurposes of the original fix, since it will be set to the max between\nHFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the\nmax between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not\ninitialized.\n\nTested by mounting an hfsplus filesystem with loop block sizes 512, 1024\nand 4096.\n\nThe produced KASAN report before the fix looks like this:\n\n[  419.944641] ==================================================================\n[  419.945655] BUG: KASAN: slab-use-after-free in hfsplus_read_wrapper+0x659/0xa0a\n[  419.946703] Read of size 2 at addr ffff88800721fc00 by task repro/10678\n[  419.947612]\n[  419.947846] CPU: 0 UID: 0 PID: 10678 Comm: repro Not tainted 6.12.0-rc5-00008-gdf56e0f2f3ca #84\n[  419.949007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\n[  419.950035] Call Trace:\n[  419.950384]  \u003cTASK\u003e\n[  419.950676]  dump_stack_lvl+0x57/0x78\n[  419.951212]  ? hfsplus_read_wrapper+0x659/0xa0a\n[  419.951830]  print_report+0x14c/0x49e\n[  419.952361]  ? __virt_addr_valid+0x267/0x278\n[  419.952979]  ? kmem_cache_debug_flags+0xc/0x1d\n[  419.953561]  ? hfsplus_read_wrapper+0x659/0xa0a\n[  419.954231]  kasan_report+0x89/0xb0\n[  419.954748]  ? hfsplus_read_wrapper+0x659/0xa0a\n[  419.955367]  hfsplus_read_wrapper+0x659/0xa0a\n[  419.955948]  ? __pfx_hfsplus_read_wrapper+0x10/0x10\n[  419.956618]  ? do_raw_spin_unlock+0x59/0x1a9\n[  419.957214]  ? _raw_spin_unlock+0x1a/0x2e\n[  419.957772]  hfsplus_fill_super+0x348/0x1590\n[  419.958355]  ? hlock_class+0x4c/0x109\n[  419.958867]  ? __pfx_hfsplus_fill_super+0x10/0x10\n[  419.959499]  ? __pfx_string+0x10/0x10\n[  419.960006]  ? lock_acquire+0x3e2/0x454\n[  419.960532]  ? bdev_name.constprop.0+0xce/0x243\n[  419.961129]  ? __pfx_bdev_name.constprop.0+0x10/0x10\n[  419.961799]  ? pointer+0x3f0/0x62f\n[  419.962277]  ? __pfx_pointer+0x10/0x10\n[  419.962761]  ? vsnprintf+0x6c4/0xfba\n[  419.963178]  ? __pfx_vsnprintf+0x10/0x10\n[  419.963621]  ? setup_bdev_super+0x376/0x3b3\n[  419.964029]  ? snprintf+0x9d/0xd2\n[  419.964344]  ? __pfx_snprintf+0x10/0x10\n[  419.964675]  ? lock_acquired+0x45c/0x5e9\n[  419.965016]  ? set_blocksize+0x139/0x1c1\n[  419.965381]  ? sb_set_blocksize+0x6d/0xae\n[  419.965742]  ? __pfx_hfsplus_fill_super+0x10/0x10\n[  419.966179]  mount_bdev+0x12f/0x1bf\n[  419.966512]  ? __pfx_mount_bdev+0x10/0x10\n[  419.966886]  ? vfs_parse_fs_string+0xce/0x111\n[  419.967293]  ? __pfx_vfs_parse_fs_string+0x10/0x10\n[  419.967702]  ? __pfx_hfsplus_mount+0x10/0x10\n[  419.968073]  legacy_get_tree+0x104/0x178\n[  419.968414]  vfs_get_tree+0x86/0x296\n[  419.968751]  path_mount+0xba3/0xd0b\n[  419.969157]  ? __pfx_path_mount+0x10/0x10\n[  419.969594]  ? kmem_cache_free+0x1e2/0x260\n[  419.970311]  do_mount+0x99/0xe0\n[  419.970630]  ? __pfx_do_mount+0x10/0x10\n[  419.971008]  __do_sys_mount+0x199/0x1c9\n[  419.971397]  do_syscall_64+0xd0/0x135\n[  419.971761]  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[  419.972233] RIP: 0033:0x7c3cb812972e\n[  419.972564] Code: 48 8b 0d f5 46 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d c2 46 0d 00 f7 d8 64 89 01 48\n[  419.974371] RSP: 002b:00007ffe30632548 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5\n[  419.975048] RAX: ffffffffffffffda RBX: 00007ffe306328d8 RCX: 00007c3cb812972e\n[  419.975701] RDX: 0000000020000000 RSI: 0000000020000c80 RDI:\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56548",
          "url": "https://www.suse.com/security/cve/CVE-2024-56548"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234853 for CVE-2024-56548",
          "url": "https://bugzilla.suse.com/1234853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235073 for CVE-2024-56548",
          "url": "https://bugzilla.suse.com/1235073"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235074 for CVE-2024-56548",
          "url": "https://bugzilla.suse.com/1235074"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-56548"
    },
    {
      "cve": "CVE-2024-56605",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56605"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()\n\nbt_sock_alloc() allocates the sk object and attaches it to the provided\nsock object. On error l2cap_sock_alloc() frees the sk object, but the\ndangling pointer is still attached to the sock object, which may create\nuse-after-free in other code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56605",
          "url": "https://www.suse.com/security/cve/CVE-2024-56605"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234853 for CVE-2024-56605",
          "url": "https://bugzilla.suse.com/1234853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235061 for CVE-2024-56605",
          "url": "https://bugzilla.suse.com/1235061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235062 for CVE-2024-56605",
          "url": "https://bugzilla.suse.com/1235062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-56605"
    },
    {
      "cve": "CVE-2024-56633",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56633"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg\n\nThe current sk memory accounting logic in __SK_REDIRECT is pre-uncharging\ntosend bytes, which is either msg-\u003esg.size or a smaller value apply_bytes.\n\nPotential problems with this strategy are as follows:\n\n- If the actual sent bytes are smaller than tosend, we need to charge some\n  bytes back, as in line 487, which is okay but seems not clean.\n\n- When tosend is set to apply_bytes, as in line 417, and (ret \u003c 0), we may\n  miss uncharging (msg-\u003esg.size - apply_bytes) bytes.\n\n[...]\n415 tosend = msg-\u003esg.size;\n416 if (psock-\u003eapply_bytes \u0026\u0026 psock-\u003eapply_bytes \u003c tosend)\n417   tosend = psock-\u003eapply_bytes;\n[...]\n443 sk_msg_return(sk, msg, tosend);\n444 release_sock(sk);\n446 origsize = msg-\u003esg.size;\n447 ret = tcp_bpf_sendmsg_redir(sk_redir, redir_ingress,\n448                             msg, tosend, flags);\n449 sent = origsize - msg-\u003esg.size;\n[...]\n454 lock_sock(sk);\n455 if (unlikely(ret \u003c 0)) {\n456   int free = sk_msg_free_nocharge(sk, msg);\n458   if (!cork)\n459     *copied -= free;\n460 }\n[...]\n487 if (eval == __SK_REDIRECT)\n488   sk_mem_charge(sk, tosend - sent);\n[...]\n\nWhen running the selftest test_txmsg_redir_wait_sndmem with txmsg_apply,\nthe following warning will be reported:\n\n------------[ cut here ]------------\nWARNING: CPU: 6 PID: 57 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x190/0x1a0\nModules linked in:\nCPU: 6 UID: 0 PID: 57 Comm: kworker/6:0 Not tainted 6.12.0-rc1.bm.1-amd64+ #43\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nWorkqueue: events sk_psock_destroy\nRIP: 0010:inet_sock_destruct+0x190/0x1a0\nRSP: 0018:ffffad0a8021fe08 EFLAGS: 00010206\nRAX: 0000000000000011 RBX: ffff9aab4475b900 RCX: ffff9aab481a0800\nRDX: 0000000000000303 RSI: 0000000000000011 RDI: ffff9aab4475b900\nRBP: ffff9aab4475b990 R08: 0000000000000000 R09: ffff9aab40050ec0\nR10: 0000000000000000 R11: ffff9aae6fdb1d01 R12: ffff9aab49c60400\nR13: ffff9aab49c60598 R14: ffff9aab49c60598 R15: dead000000000100\nFS:  0000000000000000(0000) GS:ffff9aae6fd80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffec7e47bd8 CR3: 00000001a1a1c004 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n\u003cTASK\u003e\n? __warn+0x89/0x130\n? inet_sock_destruct+0x190/0x1a0\n? report_bug+0xfc/0x1e0\n? handle_bug+0x5c/0xa0\n? exc_invalid_op+0x17/0x70\n? asm_exc_invalid_op+0x1a/0x20\n? inet_sock_destruct+0x190/0x1a0\n__sk_destruct+0x25/0x220\nsk_psock_destroy+0x2b2/0x310\nprocess_scheduled_works+0xa3/0x3e0\nworker_thread+0x117/0x240\n? __pfx_worker_thread+0x10/0x10\nkthread+0xcf/0x100\n? __pfx_kthread+0x10/0x10\nret_from_fork+0x31/0x40\n? __pfx_kthread+0x10/0x10\nret_from_fork_asm+0x1a/0x30\n\u003c/TASK\u003e\n---[ end trace 0000000000000000 ]---\n\nIn __SK_REDIRECT, a more concise way is delaying the uncharging after sent\nbytes are finalized, and uncharge this value. When (ret \u003c 0), we shall\ninvoke sk_msg_free.\n\nSame thing happens in case __SK_DROP, when tosend is set to apply_bytes,\nwe may miss uncharging (msg-\u003esg.size - apply_bytes) bytes. The same\nwarning will be reported in selftest.\n\n[...]\n468 case __SK_DROP:\n469 default:\n470 sk_msg_free_partial(sk, msg, tosend);\n471 sk_msg_apply_bytes(psock, tosend);\n472 *copied -= (tosend + delta);\n473 return -EACCES;\n[...]\n\nSo instead of sk_msg_free_partial we can do sk_msg_free here.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56633",
          "url": "https://www.suse.com/security/cve/CVE-2024-56633"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235485 for CVE-2024-56633",
          "url": "https://bugzilla.suse.com/1235485"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56633"
    },
    {
      "cve": "CVE-2024-56647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: Fix icmp host relookup triggering ip_rt_bug\n\narp link failure may trigger ip_rt_bug while xfrm enabled, call trace is:\n\nWARNING: CPU: 0 PID: 0 at net/ipv4/route.c:1241 ip_rt_bug+0x14/0x20\nModules linked in:\nCPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc6-00077-g2e1b3cc9d7f7\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996),\nBIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:ip_rt_bug+0x14/0x20\nCall Trace:\n \u003cIRQ\u003e\n ip_send_skb+0x14/0x40\n __icmp_send+0x42d/0x6a0\n ipv4_link_failure+0xe2/0x1d0\n arp_error_report+0x3c/0x50\n neigh_invalidate+0x8d/0x100\n neigh_timer_handler+0x2e1/0x330\n call_timer_fn+0x21/0x120\n __run_timer_base.part.0+0x1c9/0x270\n run_timer_softirq+0x4c/0x80\n handle_softirqs+0xac/0x280\n irq_exit_rcu+0x62/0x80\n sysvec_apic_timer_interrupt+0x77/0x90\n\nThe script below reproduces this scenario:\nip xfrm policy add src 0.0.0.0/0 dst 0.0.0.0/0 \\\n\tdir out priority 0 ptype main flag localok icmp\nip l a veth1 type veth\nip a a 192.168.141.111/24 dev veth0\nip l s veth0 up\nping 192.168.141.155 -c 1\n\nicmp_route_lookup() create input routes for locally generated packets\nwhile xfrm relookup ICMP traffic.Then it will set input route\n(dst-\u003eout = ip_rt_bug) to skb for DESTUNREACH.\n\nFor ICMP err triggered by locally generated packets, dst-\u003edev of output\nroute is loopback. Generally, xfrm relookup verification is not required\non loopback interfaces (net.ipv4.conf.lo.disable_xfrm = 1).\n\nSkip icmp relookup for locally generated packets to fix it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56647",
          "url": "https://www.suse.com/security/cve/CVE-2024-56647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235435 for CVE-2024-56647",
          "url": "https://bugzilla.suse.com/1235435"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56647"
    },
    {
      "cve": "CVE-2024-56658",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56658"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: defer final \u0027struct net\u0027 free in netns dismantle\n\nIlya reported a slab-use-after-free in dst_destroy [1]\n\nIssue is in xfrm6_net_init() and xfrm4_net_init() :\n\nThey copy xfrm[46]_dst_ops_template into net-\u003exfrm.xfrm[46]_dst_ops.\n\nBut net structure might be freed before all the dst callbacks are\ncalled. So when dst_destroy() calls later :\n\nif (dst-\u003eops-\u003edestroy)\n    dst-\u003eops-\u003edestroy(dst);\n\ndst-\u003eops points to the old net-\u003exfrm.xfrm[46]_dst_ops, which has been freed.\n\nSee a relevant issue fixed in :\n\nac888d58869b (\"net: do not delay dst_entries_add() in dst_release()\")\n\nA fix is to queue the \u0027struct net\u0027 to be freed after one\nanother cleanup_net() round (and existing rcu_barrier())\n\n[1]\n\nBUG: KASAN: slab-use-after-free in dst_destroy (net/core/dst.c:112)\nRead of size 8 at addr ffff8882137ccab0 by task swapper/37/0\nDec 03 05:46:18 kernel:\nCPU: 37 UID: 0 PID: 0 Comm: swapper/37 Kdump: loaded Not tainted 6.12.0 #67\nHardware name: Red Hat KVM/RHEL, BIOS 1.16.1-1.el9 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\ndump_stack_lvl (lib/dump_stack.c:124)\nprint_address_description.constprop.0 (mm/kasan/report.c:378)\n? dst_destroy (net/core/dst.c:112)\nprint_report (mm/kasan/report.c:489)\n? dst_destroy (net/core/dst.c:112)\n? kasan_addr_to_slab (mm/kasan/common.c:37)\nkasan_report (mm/kasan/report.c:603)\n? dst_destroy (net/core/dst.c:112)\n? rcu_do_batch (kernel/rcu/tree.c:2567)\ndst_destroy (net/core/dst.c:112)\nrcu_do_batch (kernel/rcu/tree.c:2567)\n? __pfx_rcu_do_batch (kernel/rcu/tree.c:2491)\n? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4339 kernel/locking/lockdep.c:4406)\nrcu_core (kernel/rcu/tree.c:2825)\nhandle_softirqs (kernel/softirq.c:554)\n__irq_exit_rcu (kernel/softirq.c:589 kernel/softirq.c:428 kernel/softirq.c:637)\nirq_exit_rcu (kernel/softirq.c:651)\nsysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1049 arch/x86/kernel/apic/apic.c:1049)\n \u003c/IRQ\u003e\n \u003cTASK\u003e\nasm_sysvec_apic_timer_interrupt (./arch/x86/include/asm/idtentry.h:702)\nRIP: 0010:default_idle (./arch/x86/include/asm/irqflags.h:37 ./arch/x86/include/asm/irqflags.h:92 arch/x86/kernel/process.c:743)\nCode: 00 4d 29 c8 4c 01 c7 4c 29 c2 e9 6e ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 0f 00 2d c7 c9 27 00 fb f4 \u003cfa\u003e c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90\nRSP: 0018:ffff888100d2fe00 EFLAGS: 00000246\nRAX: 00000000001870ed RBX: 1ffff110201a5fc2 RCX: ffffffffb61a3e46\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffb3d4d123\nRBP: 0000000000000000 R08: 0000000000000001 R09: ffffed11c7e1835d\nR10: ffff888e3f0c1aeb R11: 0000000000000000 R12: 0000000000000000\nR13: ffff888100d20000 R14: dffffc0000000000 R15: 0000000000000000\n? ct_kernel_exit.constprop.0 (kernel/context_tracking.c:148)\n? cpuidle_idle_call (kernel/sched/idle.c:186)\ndefault_idle_call (./include/linux/cpuidle.h:143 kernel/sched/idle.c:118)\ncpuidle_idle_call (kernel/sched/idle.c:186)\n? __pfx_cpuidle_idle_call (kernel/sched/idle.c:168)\n? lock_release (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5848)\n? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406)\n? tsc_verify_tsc_adjust (arch/x86/kernel/tsc_sync.c:59)\ndo_idle (kernel/sched/idle.c:326)\ncpu_startup_entry (kernel/sched/idle.c:423 (discriminator 1))\nstart_secondary (arch/x86/kernel/smpboot.c:202 arch/x86/kernel/smpboot.c:282)\n? __pfx_start_secondary (arch/x86/kernel/smpboot.c:232)\n? soft_restart_cpu (arch/x86/kernel/head_64.S:452)\ncommon_startup_64 (arch/x86/kernel/head_64.S:414)\n \u003c/TASK\u003e\nDec 03 05:46:18 kernel:\nAllocated by task 12184:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (./arch/x86/include/asm/current.h:49 mm/kasan/common.c:60 mm/kasan/common.c:69)\n__kasan_slab_alloc (mm/kasan/common.c:319 mm/kasan/common.c:345)\nkmem_cache_alloc_noprof (mm/slub.c:4085 mm/slub.c:4134 mm/slub.c:4141)\ncopy_net_ns (net/core/net_namespace.c:421 net/core/net_namespace.c:480)\ncreate_new_namespaces\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56658",
          "url": "https://www.suse.com/security/cve/CVE-2024-56658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235441 for CVE-2024-56658",
          "url": "https://bugzilla.suse.com/1235441"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235442 for CVE-2024-56658",
          "url": "https://bugzilla.suse.com/1235442"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56658"
    },
    {
      "cve": "CVE-2024-56688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport\n\nSince transport-\u003esock has been set to NULL during reset transport,\nXPRT_SOCK_UPD_TIMEOUT also needs to be cleared. Otherwise, the\nxs_tcp_set_socket_timeouts() may be triggered in xs_tcp_send_request()\nto dereference the transport-\u003esock that has been set to NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56688",
          "url": "https://www.suse.com/security/cve/CVE-2024-56688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235538 for CVE-2024-56688",
          "url": "https://bugzilla.suse.com/1235538"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56688"
    },
    {
      "cve": "CVE-2024-57896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-57896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: flush delalloc workers queue before stopping cleaner kthread during unmount\n\nDuring the unmount path, at close_ctree(), we first stop the cleaner\nkthread, using kthread_stop() which frees the associated task_struct, and\nthen stop and destroy all the work queues. However after we stopped the\ncleaner we may still have a worker from the delalloc_workers queue running\ninode.c:submit_compressed_extents(), which calls btrfs_add_delayed_iput(),\nwhich in turn tries to wake up the cleaner kthread - which was already\ndestroyed before, resulting in a use-after-free on the task_struct.\n\nSyzbot reported this with the following stack traces:\n\n  BUG: KASAN: slab-use-after-free in __lock_acquire+0x78/0x2100 kernel/locking/lockdep.c:5089\n  Read of size 8 at addr ffff8880259d2818 by task kworker/u8:3/52\n\n  CPU: 1 UID: 0 PID: 52 Comm: kworker/u8:3 Not tainted 6.13.0-rc1-syzkaller-00002-gcdd30ebb1b9f #0\n  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\n  Workqueue: btrfs-delalloc btrfs_work_helper\n  Call Trace:\n   \u003cTASK\u003e\n   __dump_stack lib/dump_stack.c:94 [inline]\n   dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n   print_address_description mm/kasan/report.c:378 [inline]\n   print_report+0x169/0x550 mm/kasan/report.c:489\n   kasan_report+0x143/0x180 mm/kasan/report.c:602\n   __lock_acquire+0x78/0x2100 kernel/locking/lockdep.c:5089\n   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849\n   __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]\n   _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162\n   class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:551 [inline]\n   try_to_wake_up+0xc2/0x1470 kernel/sched/core.c:4205\n   submit_compressed_extents+0xdf/0x16e0 fs/btrfs/inode.c:1615\n   run_ordered_work fs/btrfs/async-thread.c:288 [inline]\n   btrfs_work_helper+0x96f/0xc40 fs/btrfs/async-thread.c:324\n   process_one_work kernel/workqueue.c:3229 [inline]\n   process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n   worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n   kthread+0x2f0/0x390 kernel/kthread.c:389\n   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n   \u003c/TASK\u003e\n\n  Allocated by task 2:\n   kasan_save_stack mm/kasan/common.c:47 [inline]\n   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n   unpoison_slab_object mm/kasan/common.c:319 [inline]\n   __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345\n   kasan_slab_alloc include/linux/kasan.h:250 [inline]\n   slab_post_alloc_hook mm/slub.c:4104 [inline]\n   slab_alloc_node mm/slub.c:4153 [inline]\n   kmem_cache_alloc_node_noprof+0x1d9/0x380 mm/slub.c:4205\n   alloc_task_struct_node kernel/fork.c:180 [inline]\n   dup_task_struct+0x57/0x8c0 kernel/fork.c:1113\n   copy_process+0x5d1/0x3d50 kernel/fork.c:2225\n   kernel_clone+0x223/0x870 kernel/fork.c:2807\n   kernel_thread+0x1bc/0x240 kernel/fork.c:2869\n   create_kthread kernel/kthread.c:412 [inline]\n   kthreadd+0x60d/0x810 kernel/kthread.c:767\n   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\n  Freed by task 24:\n   kasan_save_stack mm/kasan/common.c:47 [inline]\n   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n   kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n   poison_slab_object mm/kasan/common.c:247 [inline]\n   __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n   kasan_slab_free include/linux/kasan.h:233 [inline]\n   slab_free_hook mm/slub.c:2338 [inline]\n   slab_free mm/slub.c:4598 [inline]\n   kmem_cache_free+0x195/0x410 mm/slub.c:4700\n   put_task_struct include/linux/sched/task.h:144 [inline]\n   delayed_put_task_struct+0x125/0x300 kernel/exit.c:227\n   rcu_do_batch kernel/rcu/tree.c:2567 [inline]\n   rcu_core+0xaaa/0x17a0 kernel/rcu/tree.c:2823\n   handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:554\n   run_ksoftirqd+0xca/0x130 kernel/softirq.c:943\n  \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-57896",
          "url": "https://www.suse.com/security/cve/CVE-2024-57896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235965 for CVE-2024-57896",
          "url": "https://bugzilla.suse.com/1235965"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-57896"
    },
    {
      "cve": "CVE-2025-21638",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21638"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: sysctl: auth_enable: avoid using current-\u003ensproxy\n\nAs mentioned in a previous commit of this series, using the \u0027net\u0027\nstructure via \u0027current\u0027 is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader\u0027s/writer\u0027s netns vs only\n  from the opener\u0027s netns.\n\n- current-\u003ensproxy can be NULL in some cases, resulting in an \u0027Oops\u0027\n  (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n  syzbot [1] using acct(2).\n\nThe \u0027net\u0027 structure can be obtained from the table-\u003edata using\ncontainer_of().\n\nNote that table-\u003edata could also be used directly, but that would\nincrease the size of this fix, while \u0027sctp.ctl_sock\u0027 still needs to be\nretrieved from \u0027net\u0027 structure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21638",
          "url": "https://www.suse.com/security/cve/CVE-2025-21638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236115 for CVE-2025-21638",
          "url": "https://bugzilla.suse.com/1236115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21638"
    },
    {
      "cve": "CVE-2025-21639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: sysctl: rto_min/max: avoid using current-\u003ensproxy\n\nAs mentioned in a previous commit of this series, using the \u0027net\u0027\nstructure via \u0027current\u0027 is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader\u0027s/writer\u0027s netns vs only\n  from the opener\u0027s netns.\n\n- current-\u003ensproxy can be NULL in some cases, resulting in an \u0027Oops\u0027\n  (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n  syzbot [1] using acct(2).\n\nThe \u0027net\u0027 structure can be obtained from the table-\u003edata using\ncontainer_of().\n\nNote that table-\u003edata could also be used directly, as this is the only\nmember needed from the \u0027net\u0027 structure, but that would increase the size\nof this fix, to use \u0027*data\u0027 everywhere \u0027net-\u003esctp.rto_min/max\u0027 is used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21639",
          "url": "https://www.suse.com/security/cve/CVE-2025-21639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236122 for CVE-2025-21639",
          "url": "https://bugzilla.suse.com/1236122"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21639"
    },
    {
      "cve": "CVE-2025-21640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: sysctl: cookie_hmac_alg: avoid using current-\u003ensproxy\n\nAs mentioned in a previous commit of this series, using the \u0027net\u0027\nstructure via \u0027current\u0027 is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader\u0027s/writer\u0027s netns vs only\n  from the opener\u0027s netns.\n\n- current-\u003ensproxy can be NULL in some cases, resulting in an \u0027Oops\u0027\n  (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n  syzbot [1] using acct(2).\n\nThe \u0027net\u0027 structure can be obtained from the table-\u003edata using\ncontainer_of().\n\nNote that table-\u003edata could also be used directly, as this is the only\nmember needed from the \u0027net\u0027 structure, but that would increase the size\nof this fix, to use \u0027*data\u0027 everywhere \u0027net-\u003esctp.sctp_hmac_alg\u0027 is\nused.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21640",
          "url": "https://www.suse.com/security/cve/CVE-2025-21640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236123 for CVE-2025-21640",
          "url": "https://bugzilla.suse.com/1236123"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21640"
    },
    {
      "cve": "CVE-2025-21673",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21673"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix double free of TCP_Server_Info::hostname\n\nWhen shutting down the server in cifs_put_tcp_session(), cifsd thread\nmight be reconnecting to multiple DFS targets before it realizes it\nshould exit the loop, so @server-\u003ehostname can\u0027t be freed as long as\ncifsd thread isn\u0027t done.  Otherwise the following can happen:\n\n  RIP: 0010:__slab_free+0x223/0x3c0\n  Code: 5e 41 5f c3 cc cc cc cc 4c 89 de 4c 89 cf 44 89 44 24 08 4c 89\n  1c 24 e8 fb cf 8e 00 44 8b 44 24 08 4c 8b 1c 24 e9 5f fe ff ff \u003c0f\u003e\n  0b 41 f7 45 08 00 0d 21 00 0f 85 2d ff ff ff e9 1f ff ff ff 80\n  RSP: 0018:ffffb26180dbfd08 EFLAGS: 00010246\n  RAX: ffff8ea34728e510 RBX: ffff8ea34728e500 RCX: 0000000000800068\n  RDX: 0000000000800068 RSI: 0000000000000000 RDI: ffff8ea340042400\n  RBP: ffffe112041ca380 R08: 0000000000000001 R09: 0000000000000000\n  R10: 6170732e31303000 R11: 70726f632e786563 R12: ffff8ea34728e500\n  R13: ffff8ea340042400 R14: ffff8ea34728e500 R15: 0000000000800068\n  FS: 0000000000000000(0000) GS:ffff8ea66fd80000(0000)\n  000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007ffc25376080 CR3: 000000012a2ba001 CR4:\n  PKRU: 55555554\n  Call Trace:\n   \u003cTASK\u003e\n   ? show_trace_log_lvl+0x1c4/0x2df\n   ? show_trace_log_lvl+0x1c4/0x2df\n   ? __reconnect_target_unlocked+0x3e/0x160 [cifs]\n   ? __die_body.cold+0x8/0xd\n   ? die+0x2b/0x50\n   ? do_trap+0xce/0x120\n   ? __slab_free+0x223/0x3c0\n   ? do_error_trap+0x65/0x80\n   ? __slab_free+0x223/0x3c0\n   ? exc_invalid_op+0x4e/0x70\n   ? __slab_free+0x223/0x3c0\n   ? asm_exc_invalid_op+0x16/0x20\n   ? __slab_free+0x223/0x3c0\n   ? extract_hostname+0x5c/0xa0 [cifs]\n   ? extract_hostname+0x5c/0xa0 [cifs]\n   ? __kmalloc+0x4b/0x140\n   __reconnect_target_unlocked+0x3e/0x160 [cifs]\n   reconnect_dfs_server+0x145/0x430 [cifs]\n   cifs_handle_standard+0x1ad/0x1d0 [cifs]\n   cifs_demultiplex_thread+0x592/0x730 [cifs]\n   ? __pfx_cifs_demultiplex_thread+0x10/0x10 [cifs]\n   kthread+0xdd/0x100\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork+0x29/0x50\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21673",
          "url": "https://www.suse.com/security/cve/CVE-2025-21673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236689 for CVE-2025-21673",
          "url": "https://bugzilla.suse.com/1236689"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21673"
    },
    {
      "cve": "CVE-2025-21689",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21689"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()\n\nThis patch addresses a null-ptr-deref in qt2_process_read_urb() due to\nan incorrect bounds check in the following:\n\n       if (newport \u003e serial-\u003enum_ports) {\n               dev_err(\u0026port-\u003edev,\n                       \"%s - port change to invalid port: %i\\n\",\n                       __func__, newport);\n               break;\n       }\n\nThe condition doesn\u0027t account for the valid range of the serial-\u003eport\nbuffer, which is from 0 to serial-\u003enum_ports - 1. When newport is equal\nto serial-\u003enum_ports, the assignment of \"port\" in the\nfollowing code is out-of-bounds and NULL:\n\n       serial_priv-\u003ecurrent_port = newport;\n       port = serial-\u003eport[serial_priv-\u003ecurrent_port];\n\nThe fix checks if newport is greater than or equal to serial-\u003enum_ports\nindicating it is out-of-bounds.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21689",
          "url": "https://www.suse.com/security/cve/CVE-2025-21689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237017 for CVE-2025-21689",
          "url": "https://bugzilla.suse.com/1237017"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21689"
    },
    {
      "cve": "CVE-2025-21690",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21690"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: storvsc: Ratelimit warning logs to prevent VM denial of service\n\nIf there\u0027s a persistent error in the hypervisor, the SCSI warning for\nfailed I/O can flood the kernel log and max out CPU utilization,\npreventing troubleshooting from the VM side. Ratelimit the warning so\nit doesn\u0027t DoS the VM.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21690",
          "url": "https://www.suse.com/security/cve/CVE-2025-21690"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237025 for CVE-2025-21690",
          "url": "https://bugzilla.suse.com/1237025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21690"
    },
    {
      "cve": "CVE-2025-21700",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21700"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: Disallow replacing of child qdisc from one parent to another\n\nLion Ackermann was able to create a UAF which can be abused for privilege\nescalation with the following script\n\nStep 1. create root qdisc\ntc qdisc add dev lo root handle 1:0 drr\n\nstep2. a class for packet aggregation do demonstrate uaf\ntc class add dev lo classid 1:1 drr\n\nstep3. a class for nesting\ntc class add dev lo classid 1:2 drr\n\nstep4. a class to graft qdisc to\ntc class add dev lo classid 1:3 drr\n\nstep5.\ntc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024\n\nstep6.\ntc qdisc add dev lo parent 1:2 handle 3:0 drr\n\nstep7.\ntc class add dev lo classid 3:1 drr\n\nstep 8.\ntc qdisc add dev lo parent 3:1 handle 4:0 pfifo\n\nstep 9. Display the class/qdisc layout\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nstep10. trigger the bug \u003c=== prevented by this patch\ntc qdisc replace dev lo parent 1:3 handle 4:0\n\nstep 11. Redisplay again the qdiscs/classes\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 1:3 root leaf 4: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nObserve that a) parent for 4:0 does not change despite the replace request.\nThere can only be one parent.  b) refcount has gone up by two for 4:0 and\nc) both class 1:3 and 3:1 are pointing to it.\n\nStep 12.  send one packet to plug\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001))\nstep13.  send one packet to the grafted fifo\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003))\n\nstep14. lets trigger the uaf\ntc class delete dev lo classid 1:3\ntc class delete dev lo classid 1:1\n\nThe semantics of \"replace\" is for a del/add _on the same node_ and not\na delete from one node(3:1) and add to another node (1:3) as in step10.\nWhile we could \"fix\" with a more complex approach there could be\nconsequences to expectations so the patch takes the preventive approach of\n\"disallow such config\".\n\nJoint work with Lion Ackermann \u003cnnamrec@gmail.com\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21700",
          "url": "https://www.suse.com/security/cve/CVE-2025-21700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237159 for CVE-2025-21700",
          "url": "https://bugzilla.suse.com/1237159"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21700"
    },
    {
      "cve": "CVE-2025-21753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free when attempting to join an aborted transaction\n\nWhen we are trying to join the current transaction and if it\u0027s aborted,\nwe read its \u0027aborted\u0027 field after unlocking fs_info-\u003etrans_lock and\nwithout holding any extra reference count on it. This means that a\nconcurrent task that is aborting the transaction may free the transaction\nbefore we read its \u0027aborted\u0027 field, leading to a use-after-free.\n\nFix this by reading the \u0027aborted\u0027 field while holding fs_info-\u003etrans_lock\nsince any freeing task must first acquire that lock and set\nfs_info-\u003erunning_transaction to NULL before freeing the transaction.\n\nThis was reported by syzbot and Dmitry with the following stack traces\nfrom KASAN:\n\n   ==================================================================\n   BUG: KASAN: slab-use-after-free in join_transaction+0xd9b/0xda0 fs/btrfs/transaction.c:278\n   Read of size 4 at addr ffff888011839024 by task kworker/u4:9/1128\n\n   CPU: 0 UID: 0 PID: 1128 Comm: kworker/u4:9 Not tainted 6.13.0-rc7-syzkaller-00019-gc45323b7560e #0\n   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\n   Workqueue: events_unbound btrfs_async_reclaim_data_space\n   Call Trace:\n    \u003cTASK\u003e\n    __dump_stack lib/dump_stack.c:94 [inline]\n    dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n    print_address_description mm/kasan/report.c:378 [inline]\n    print_report+0x169/0x550 mm/kasan/report.c:489\n    kasan_report+0x143/0x180 mm/kasan/report.c:602\n    join_transaction+0xd9b/0xda0 fs/btrfs/transaction.c:278\n    start_transaction+0xaf8/0x1670 fs/btrfs/transaction.c:697\n    flush_space+0x448/0xcf0 fs/btrfs/space-info.c:803\n    btrfs_async_reclaim_data_space+0x159/0x510 fs/btrfs/space-info.c:1321\n    process_one_work kernel/workqueue.c:3236 [inline]\n    process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3317\n    worker_thread+0x870/0xd30 kernel/workqueue.c:3398\n    kthread+0x2f0/0x390 kernel/kthread.c:389\n    ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n    ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n    \u003c/TASK\u003e\n\n   Allocated by task 5315:\n    kasan_save_stack mm/kasan/common.c:47 [inline]\n    kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n    poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n    __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394\n    kasan_kmalloc include/linux/kasan.h:260 [inline]\n    __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329\n    kmalloc_noprof include/linux/slab.h:901 [inline]\n    join_transaction+0x144/0xda0 fs/btrfs/transaction.c:308\n    start_transaction+0xaf8/0x1670 fs/btrfs/transaction.c:697\n    btrfs_create_common+0x1b2/0x2e0 fs/btrfs/inode.c:6572\n    lookup_open fs/namei.c:3649 [inline]\n    open_last_lookups fs/namei.c:3748 [inline]\n    path_openat+0x1c03/0x3590 fs/namei.c:3984\n    do_filp_open+0x27f/0x4e0 fs/namei.c:4014\n    do_sys_openat2+0x13e/0x1d0 fs/open.c:1402\n    do_sys_open fs/open.c:1417 [inline]\n    __do_sys_creat fs/open.c:1495 [inline]\n    __se_sys_creat fs/open.c:1489 [inline]\n    __x64_sys_creat+0x123/0x170 fs/open.c:1489\n    do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n    do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n    entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n   Freed by task 5336:\n    kasan_save_stack mm/kasan/common.c:47 [inline]\n    kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n    kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n    poison_slab_object mm/kasan/common.c:247 [inline]\n    __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n    kasan_slab_free include/linux/kasan.h:233 [inline]\n    slab_free_hook mm/slub.c:2353 [inline]\n    slab_free mm/slub.c:4613 [inline]\n    kfree+0x196/0x430 mm/slub.c:4761\n    cleanup_transaction fs/btrfs/transaction.c:2063 [inline]\n    btrfs_commit_transaction+0x2c97/0x3720 fs/btrfs/transaction.c:2598\n    insert_balance_item+0x1284/0x20b0 fs/btrfs/volumes.c:3757\n    btrfs_balance+0x992/\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21753",
          "url": "https://www.suse.com/security/cve/CVE-2025-21753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237875 for CVE-2025-21753",
          "url": "https://bugzilla.suse.com/1237875"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_250-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.250.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.250.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.250.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-11T10:55:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21753"
    }
  ]
}
  wid-sec-w-2022-0243
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.\r\nRed Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.\r\nVirtualization ist eine Virtualisierungsl\u00f6sung von Red Hat, die die simultane Ausf\u00fchrung von verschiedenen Betriebssystemen auf einem Host-System erm\u00f6glicht.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel, Red Hat Enterprise Linux und Red Hat Virtualization ausnutzen, um seine Privilegien zu erh\u00f6hen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- UNIX",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0243 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0243.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0243 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0243"
      },
      {
        "category": "external",
        "summary": "Openwall Security Report vom 2021-06-27",
        "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
      },
      {
        "category": "external",
        "summary": "Red Hat Customer Portal vom 2021-06-27",
        "url": "https://access.redhat.com/security/cve/cve-2021-22543"
      },
      {
        "category": "external",
        "summary": "Github Linux KVM vom 2021-06-27",
        "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3044 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3044"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3057 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3057"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2644-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2645-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2646-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2647-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2643-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3088 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3088"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3057 vom 2021-08-12",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3057.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2678-1 vom 2021-08-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2687-1 vom 2021-08-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3173 vom 2021-08-17",
        "url": "https://access.redhat.com/errata/RHSA-2021:3173"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3181 vom 2021-08-17",
        "url": "https://access.redhat.com/errata/RHSA-2021:3181"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2695-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2756-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2746-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3235 vom 2021-08-20",
        "url": "https://access.redhat.com/errata/RHSA-2021:3235"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1699 vom 2021-08-24",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1699.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2021-108 vom 2021-08-25",
        "url": "https://downloads.avaya.com/css/P8/documents/101077238"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3361 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3361"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3375 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3375"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3363 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3363"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3380 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3380"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3262 vom 2021-09-01",
        "url": "https://access.redhat.com/errata/RHSA-2021:3262"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3454 vom 2021-09-08",
        "url": "https://access.redhat.com/errata/RHSA-2021:3454"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-1 vom 2021-09-09",
        "url": "https://ubuntu.com/security/notices/USN-5071-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5070-1 vom 2021-09-09",
        "url": "https://ubuntu.com/security/notices/USN-5070-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-2 vom 2021-09-16",
        "url": "https://ubuntu.com/security/notices/USN-5071-2"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9451 vom 2021-09-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9451.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9450 vom 2021-09-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9450.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9452 vom 2021-09-21",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9452.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9453 vom 2021-09-21",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9453.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3598 vom 2021-09-21",
        "url": "https://access.redhat.com/errata/RHSA-2021:3598"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-3 vom 2021-09-22",
        "url": "https://ubuntu.com/security/notices/USN-5071-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5094-2 vom 2021-09-30",
        "url": "https://ubuntu.com/security/notices/USN-5094-2"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1539 vom 2021-10-05",
        "url": "https://alas.aws.amazon.com/ALAS-2021-1539.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3725 vom 2021-10-05",
        "url": "https://access.redhat.com/errata/RHSA-2021:3725"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5106-1 vom 2021-10-06",
        "url": "https://ubuntu.com/security/notices/USN-5106-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3768 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3768"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3767 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3767"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3766 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3766"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3801 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3801"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3814 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3814"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3802 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3802"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3812 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3812"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3801 vom 2021-10-13",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3801.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2785 vom 2021-10-16",
        "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3943 vom 2021-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2021:3943"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5120-1 vom 2021-10-22",
        "url": "https://ubuntu.com/security/notices/USN-5120-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3987 vom 2021-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2021:3987"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:4000 vom 2021-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2021:4000"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2021:3801 vom 2021-11-17",
        "url": "https://lists.centos.org/pipermail/centos-announce/2021-November/048398.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3969-1 vom 2021-12-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3972-1 vom 2021-12-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2843 vom 2021-12-16",
        "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-002 vom 2022-01-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-002.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-004 vom 2022-01-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-004.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2022-001 vom 2022-06-10",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-001.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2022-2022-083 vom 2022-06-13",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-083.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:5640 vom 2022-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2022:5640"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2023-023 vom 2023-07-13",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2023-023.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2023-036 vom 2023-07-13",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-036.html"
      },
      {
        "category": "external",
        "summary": "Dell Security Update vom 2025-10-02",
        "url": "https://www.dell.com/support/kbdoc/000376224"
      }
    ],
    "source_lang": "en-US",
    "title": "Linux Kernel: Schwachstelle erm\u00f6glicht Privilegieneskalation",
    "tracking": {
      "current_release_date": "2025-10-01T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-02T08:18:22.395+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2022-0243",
      "initial_release_date": "2021-06-27T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2021-06-27T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2021-08-09T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-10T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2021-08-11T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-08-12T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-15T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-16T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-17T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-19T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-24T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-08-26T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2021-08-30T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-01T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-07T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-08T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-16T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
        },
        {
          "date": "2021-09-20T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-09-21T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-30T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-04T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-10-06T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-11T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-12T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-13T22:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-10-17T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-19T22:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-21T22:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-25T22:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-26T22:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-11-17T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2021-12-07T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-08T23:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-16T23:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2022-01-30T23:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-09T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-13T22:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-07-19T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-13T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-10-01T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "39"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Experience Portal",
            "product": {
              "name": "Avaya Aura Experience Portal",
              "product_id": "T015519",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_experience_portal:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
                  "product_id": "T045879"
                }
              },
              {
                "category": "product_version",
                "name": "8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.4.0.0",
                  "product_id": "T045879-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
                  "product_id": "T045881"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.70",
                  "product_id": "T045881-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
                  "product_id": "T047343"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.40",
                  "product_id": "T047343-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
                  "product_id": "T047344"
                }
              },
              {
                "category": "product_version",
                "name": "8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.3.1.10",
                  "product_id": "T047344-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source Linux Kernel",
            "product": {
              "name": "Open Source Linux Kernel",
              "product_id": "6368",
              "product_identification_helper": {
                "cpe": "cpe:/o:linux:linux_kernel:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7",
                "product": {
                  "name": "Red Hat Enterprise Linux 7",
                  "product_id": "T003303",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "8",
                "product": {
                  "name": "Red Hat Enterprise Linux 8",
                  "product_id": "T014111",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "4",
                "product": {
                  "name": "Red Hat Virtualization 4",
                  "product_id": "T013699",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:virtualization:4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Virtualization"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "product_status": {
        "known_affected": [
          "T015519",
          "6368",
          "T013699",
          "T003303",
          "T004914",
          "T014111",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T047343",
          "398363",
          "1727",
          "T045881",
          "T047344"
        ]
      },
      "release_date": "2021-06-27T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    }
  ]
}
  WID-SEC-W-2024-1591
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service  zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1591 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1591 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
      },
      {
        "category": "external",
        "summary": "Juniper Patchday July 2024 vom 2024-07-10",
        "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
      }
    ],
    "source_lang": "en-US",
    "title": "Juniper JUNOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-11-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-11-12T09:31:28.569+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1591",
      "initial_release_date": "2024-07-10T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-07-10T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "2",
          "summary": "URL Kodierung angepasst"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Juniper JUNOS",
            "product": {
              "name": "Juniper JUNOS",
              "product_id": "T036093",
              "product_identification_helper": {
                "cpe": "cpe:/o:juniper:junos:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-20001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2006-20001"
    },
    {
      "cve": "CVE-2007-5846",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2007-5846"
    },
    {
      "cve": "CVE-2008-6123",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2008-6123"
    },
    {
      "cve": "CVE-2011-1473",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-1473"
    },
    {
      "cve": "CVE-2011-5094",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-5094"
    },
    {
      "cve": "CVE-2012-6151",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2012-6151"
    },
    {
      "cve": "CVE-2014-10064",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-10064"
    },
    {
      "cve": "CVE-2014-2285",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2285"
    },
    {
      "cve": "CVE-2014-2310",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2310"
    },
    {
      "cve": "CVE-2014-3565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-3565"
    },
    {
      "cve": "CVE-2014-7191",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-7191"
    },
    {
      "cve": "CVE-2014-8882",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-8882"
    },
    {
      "cve": "CVE-2015-5621",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-5621"
    },
    {
      "cve": "CVE-2015-8100",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-8100"
    },
    {
      "cve": "CVE-2015-9262",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-9262"
    },
    {
      "cve": "CVE-2016-1000232",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-1000232"
    },
    {
      "cve": "CVE-2016-10540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-10540"
    },
    {
      "cve": "CVE-2016-4658",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-4658"
    },
    {
      "cve": "CVE-2017-1000048",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-1000048"
    },
    {
      "cve": "CVE-2017-15010",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-15010"
    },
    {
      "cve": "CVE-2018-18065",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-18065"
    },
    {
      "cve": "CVE-2018-20834",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-20834"
    },
    {
      "cve": "CVE-2018-3737",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-3737"
    },
    {
      "cve": "CVE-2018-7408",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-7408"
    },
    {
      "cve": "CVE-2019-10081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10081"
    },
    {
      "cve": "CVE-2019-10082",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10082"
    },
    {
      "cve": "CVE-2019-10092",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10092"
    },
    {
      "cve": "CVE-2019-10097",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10097"
    },
    {
      "cve": "CVE-2019-10098",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10098"
    },
    {
      "cve": "CVE-2019-11719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11719"
    },
    {
      "cve": "CVE-2019-11727",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11727"
    },
    {
      "cve": "CVE-2019-11756",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11756"
    },
    {
      "cve": "CVE-2019-16775",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16775"
    },
    {
      "cve": "CVE-2019-16776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16776"
    },
    {
      "cve": "CVE-2019-16777",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16777"
    },
    {
      "cve": "CVE-2019-17006",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17006"
    },
    {
      "cve": "CVE-2019-17023",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17023"
    },
    {
      "cve": "CVE-2019-17567",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17567"
    },
    {
      "cve": "CVE-2019-20149",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20149"
    },
    {
      "cve": "CVE-2019-20892",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20892"
    },
    {
      "cve": "CVE-2019-9517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-9517"
    },
    {
      "cve": "CVE-2020-11668",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11668"
    },
    {
      "cve": "CVE-2020-11984",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11984"
    },
    {
      "cve": "CVE-2020-11993",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11993"
    },
    {
      "cve": "CVE-2020-12362",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12362"
    },
    {
      "cve": "CVE-2020-12400",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12400"
    },
    {
      "cve": "CVE-2020-12401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12401"
    },
    {
      "cve": "CVE-2020-12402",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12402"
    },
    {
      "cve": "CVE-2020-12403",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12403"
    },
    {
      "cve": "CVE-2020-13938",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13938"
    },
    {
      "cve": "CVE-2020-13950",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13950"
    },
    {
      "cve": "CVE-2020-14145",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-14145"
    },
    {
      "cve": "CVE-2020-15861",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15861"
    },
    {
      "cve": "CVE-2020-15862",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15862"
    },
    {
      "cve": "CVE-2020-1927",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1927"
    },
    {
      "cve": "CVE-2020-1934",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1934"
    },
    {
      "cve": "CVE-2020-28469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28469"
    },
    {
      "cve": "CVE-2020-28502",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28502"
    },
    {
      "cve": "CVE-2020-35452",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-35452"
    },
    {
      "cve": "CVE-2020-36049",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-36049"
    },
    {
      "cve": "CVE-2020-6829",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-6829"
    },
    {
      "cve": "CVE-2020-7660",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7660"
    },
    {
      "cve": "CVE-2020-7754",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7754"
    },
    {
      "cve": "CVE-2020-7774",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7774"
    },
    {
      "cve": "CVE-2020-8648",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-9490",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-9490"
    },
    {
      "cve": "CVE-2021-22543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-2342",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2342"
    },
    {
      "cve": "CVE-2021-23440",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-23440"
    },
    {
      "cve": "CVE-2021-2356",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2356"
    },
    {
      "cve": "CVE-2021-2372",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2372"
    },
    {
      "cve": "CVE-2021-2385",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2385"
    },
    {
      "cve": "CVE-2021-2389",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2389"
    },
    {
      "cve": "CVE-2021-2390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2390"
    },
    {
      "cve": "CVE-2021-25745",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25745"
    },
    {
      "cve": "CVE-2021-25746",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25746"
    },
    {
      "cve": "CVE-2021-25748",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25748"
    },
    {
      "cve": "CVE-2021-26690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26690"
    },
    {
      "cve": "CVE-2021-26691",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26691"
    },
    {
      "cve": "CVE-2021-27290",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-27290"
    },
    {
      "cve": "CVE-2021-29469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-29469"
    },
    {
      "cve": "CVE-2021-30641",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-30641"
    },
    {
      "cve": "CVE-2021-31535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31535"
    },
    {
      "cve": "CVE-2021-31618",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31618"
    },
    {
      "cve": "CVE-2021-3177",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3177"
    },
    {
      "cve": "CVE-2021-32803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32803"
    },
    {
      "cve": "CVE-2021-32804",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32804"
    },
    {
      "cve": "CVE-2021-33033",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33034",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33034"
    },
    {
      "cve": "CVE-2021-33193",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33193"
    },
    {
      "cve": "CVE-2021-3347",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3347"
    },
    {
      "cve": "CVE-2021-33909",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-34798",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-36160",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-37701",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37701"
    },
    {
      "cve": "CVE-2021-37712",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37712"
    },
    {
      "cve": "CVE-2021-37713",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37713"
    },
    {
      "cve": "CVE-2021-3803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3803"
    },
    {
      "cve": "CVE-2021-39275",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2021-41524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41524"
    },
    {
      "cve": "CVE-2021-41773",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41773"
    },
    {
      "cve": "CVE-2021-42013",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-42013"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44225",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44225"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-44906",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44906"
    },
    {
      "cve": "CVE-2022-21245",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21245"
    },
    {
      "cve": "CVE-2022-21270",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21270"
    },
    {
      "cve": "CVE-2022-21303",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21303"
    },
    {
      "cve": "CVE-2022-21304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21304"
    },
    {
      "cve": "CVE-2022-21344",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21344"
    },
    {
      "cve": "CVE-2022-21367",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21367"
    },
    {
      "cve": "CVE-2022-21417",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21417"
    },
    {
      "cve": "CVE-2022-21427",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21427"
    },
    {
      "cve": "CVE-2022-21444",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21444"
    },
    {
      "cve": "CVE-2022-21451",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21451"
    },
    {
      "cve": "CVE-2022-21454",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21454"
    },
    {
      "cve": "CVE-2022-21460",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21460"
    },
    {
      "cve": "CVE-2022-21589",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21589"
    },
    {
      "cve": "CVE-2022-21592",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21592"
    },
    {
      "cve": "CVE-2022-21595",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21595"
    },
    {
      "cve": "CVE-2022-21608",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21608"
    },
    {
      "cve": "CVE-2022-21617",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21617"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-23471",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23471"
    },
    {
      "cve": "CVE-2022-23524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23524"
    },
    {
      "cve": "CVE-2022-23525",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23525"
    },
    {
      "cve": "CVE-2022-23526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23526"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-25147",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25147"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-2526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-2526"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26377",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-26377"
    },
    {
      "cve": "CVE-2022-28330",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28330"
    },
    {
      "cve": "CVE-2022-28614",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28614"
    },
    {
      "cve": "CVE-2022-28615",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28615"
    },
    {
      "cve": "CVE-2022-29167",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29167"
    },
    {
      "cve": "CVE-2022-29404",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29404"
    },
    {
      "cve": "CVE-2022-30522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30522"
    },
    {
      "cve": "CVE-2022-30556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30556"
    },
    {
      "cve": "CVE-2022-31813",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-31813"
    },
    {
      "cve": "CVE-2022-3517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-3564",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3564"
    },
    {
      "cve": "CVE-2022-36760",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2022-37434",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-37436",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37436"
    },
    {
      "cve": "CVE-2022-40674",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-40674"
    },
    {
      "cve": "CVE-2022-41741",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41741"
    },
    {
      "cve": "CVE-2022-41742",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41742"
    },
    {
      "cve": "CVE-2022-4203",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4203"
    },
    {
      "cve": "CVE-2022-4304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4304"
    },
    {
      "cve": "CVE-2022-4450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4450"
    },
    {
      "cve": "CVE-2022-46663",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-46663"
    },
    {
      "cve": "CVE-2022-4886",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4886"
    },
    {
      "cve": "CVE-2023-0215",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0215"
    },
    {
      "cve": "CVE-2023-0216",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0216"
    },
    {
      "cve": "CVE-2023-0217",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0217"
    },
    {
      "cve": "CVE-2023-0286",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0286"
    },
    {
      "cve": "CVE-2023-0401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0401"
    },
    {
      "cve": "CVE-2023-0464",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0464"
    },
    {
      "cve": "CVE-2023-0465",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0465"
    },
    {
      "cve": "CVE-2023-0466",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0466"
    },
    {
      "cve": "CVE-2023-0767",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0767"
    },
    {
      "cve": "CVE-2023-1255",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-1255"
    },
    {
      "cve": "CVE-2023-2002",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2002"
    },
    {
      "cve": "CVE-2023-20593",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-20593"
    },
    {
      "cve": "CVE-2023-21830",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21830"
    },
    {
      "cve": "CVE-2023-21840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21840"
    },
    {
      "cve": "CVE-2023-21843",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21843"
    },
    {
      "cve": "CVE-2023-21912",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21912"
    },
    {
      "cve": "CVE-2023-21963",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21963"
    },
    {
      "cve": "CVE-2023-21980",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21980"
    },
    {
      "cve": "CVE-2023-22025",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22025"
    },
    {
      "cve": "CVE-2023-22067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22067"
    },
    {
      "cve": "CVE-2023-22081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22081"
    },
    {
      "cve": "CVE-2023-22652",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22652"
    },
    {
      "cve": "CVE-2023-24329",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-25153",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25153"
    },
    {
      "cve": "CVE-2023-25173",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25173"
    },
    {
      "cve": "CVE-2023-25690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25690"
    },
    {
      "cve": "CVE-2023-2700",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2700"
    },
    {
      "cve": "CVE-2023-27522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-27522"
    },
    {
      "cve": "CVE-2023-2828",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2828"
    },
    {
      "cve": "CVE-2023-28840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28840"
    },
    {
      "cve": "CVE-2023-28841",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28841"
    },
    {
      "cve": "CVE-2023-28842",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28842"
    },
    {
      "cve": "CVE-2023-2975",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-30079",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30079"
    },
    {
      "cve": "CVE-2023-30630",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30630"
    },
    {
      "cve": "CVE-2023-3090",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3090"
    },
    {
      "cve": "CVE-2023-32067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32067"
    },
    {
      "cve": "CVE-2023-32360",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32360"
    },
    {
      "cve": "CVE-2023-32435",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32435"
    },
    {
      "cve": "CVE-2023-32439",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32439"
    },
    {
      "cve": "CVE-2023-32732",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32732"
    },
    {
      "cve": "CVE-2023-3341",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3341"
    },
    {
      "cve": "CVE-2023-3390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3390"
    },
    {
      "cve": "CVE-2023-33953",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-33953"
    },
    {
      "cve": "CVE-2023-34058",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34058"
    },
    {
      "cve": "CVE-2023-34059",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34059"
    },
    {
      "cve": "CVE-2023-3446",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-34969",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34969"
    },
    {
      "cve": "CVE-2023-35001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35001"
    },
    {
      "cve": "CVE-2023-35788",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35788"
    },
    {
      "cve": "CVE-2023-3611",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3611"
    },
    {
      "cve": "CVE-2023-37450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-37450"
    },
    {
      "cve": "CVE-2023-3776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3776"
    },
    {
      "cve": "CVE-2023-3817",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4004",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4004"
    },
    {
      "cve": "CVE-2023-4206",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4206"
    },
    {
      "cve": "CVE-2023-4207",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4207"
    },
    {
      "cve": "CVE-2023-4208",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4208"
    },
    {
      "cve": "CVE-2023-42753",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-42753"
    },
    {
      "cve": "CVE-2023-4785",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4785"
    },
    {
      "cve": "CVE-2023-4807",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-4863",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4863"
    },
    {
      "cve": "CVE-2023-5043",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5043"
    },
    {
      "cve": "CVE-2023-5129",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5129"
    },
    {
      "cve": "CVE-2023-5363",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2024-20918",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20918"
    },
    {
      "cve": "CVE-2024-20919",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20919"
    },
    {
      "cve": "CVE-2024-20921",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20921"
    },
    {
      "cve": "CVE-2024-20926",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20926"
    },
    {
      "cve": "CVE-2024-20932",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20932"
    },
    {
      "cve": "CVE-2024-20945",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20945"
    },
    {
      "cve": "CVE-2024-20952",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20952"
    },
    {
      "cve": "CVE-2024-39511",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39511"
    },
    {
      "cve": "CVE-2024-39512",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39512"
    },
    {
      "cve": "CVE-2024-39513",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39513"
    },
    {
      "cve": "CVE-2024-39514",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39514"
    },
    {
      "cve": "CVE-2024-39517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39517"
    },
    {
      "cve": "CVE-2024-39518",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39518"
    },
    {
      "cve": "CVE-2024-39519",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39519"
    },
    {
      "cve": "CVE-2024-39520",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39520"
    },
    {
      "cve": "CVE-2024-39521",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39521"
    },
    {
      "cve": "CVE-2024-39522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39522"
    },
    {
      "cve": "CVE-2024-39523",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39523"
    },
    {
      "cve": "CVE-2024-39524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39524"
    },
    {
      "cve": "CVE-2024-39528",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39528"
    },
    {
      "cve": "CVE-2024-39529",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39529"
    },
    {
      "cve": "CVE-2024-39530",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39530"
    },
    {
      "cve": "CVE-2024-39531",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39531"
    },
    {
      "cve": "CVE-2024-39532",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39532"
    },
    {
      "cve": "CVE-2024-39533",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39533"
    },
    {
      "cve": "CVE-2024-39535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39535"
    },
    {
      "cve": "CVE-2024-39536",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39536"
    },
    {
      "cve": "CVE-2024-39537",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39537"
    },
    {
      "cve": "CVE-2024-39538",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39538"
    },
    {
      "cve": "CVE-2024-39539",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39539"
    },
    {
      "cve": "CVE-2024-39540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39540"
    },
    {
      "cve": "CVE-2024-39541",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39541"
    },
    {
      "cve": "CVE-2024-39542",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39542"
    },
    {
      "cve": "CVE-2024-39543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39543"
    },
    {
      "cve": "CVE-2024-39545",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39545"
    },
    {
      "cve": "CVE-2024-39546",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39546"
    },
    {
      "cve": "CVE-2024-39548",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39548"
    },
    {
      "cve": "CVE-2024-39549",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39549"
    },
    {
      "cve": "CVE-2024-39550",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39550"
    },
    {
      "cve": "CVE-2024-39551",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39551"
    },
    {
      "cve": "CVE-2024-39553",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39553"
    },
    {
      "cve": "CVE-2024-39554",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39554"
    },
    {
      "cve": "CVE-2024-39555",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39555"
    },
    {
      "cve": "CVE-2024-39556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39556"
    },
    {
      "cve": "CVE-2024-39557",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39557"
    },
    {
      "cve": "CVE-2024-39558",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39558"
    },
    {
      "cve": "CVE-2024-39559",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39559"
    },
    {
      "cve": "CVE-2024-39560",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39560"
    },
    {
      "cve": "CVE-2024-39561",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39561"
    },
    {
      "cve": "CVE-2024-39565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39565"
    }
  ]
}
  wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service  zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1591 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1591 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
      },
      {
        "category": "external",
        "summary": "Juniper Patchday July 2024 vom 2024-07-10",
        "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
      }
    ],
    "source_lang": "en-US",
    "title": "Juniper JUNOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-11-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-11-12T09:31:28.569+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1591",
      "initial_release_date": "2024-07-10T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-07-10T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "2",
          "summary": "URL Kodierung angepasst"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Juniper JUNOS",
            "product": {
              "name": "Juniper JUNOS",
              "product_id": "T036093",
              "product_identification_helper": {
                "cpe": "cpe:/o:juniper:junos:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-20001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2006-20001"
    },
    {
      "cve": "CVE-2007-5846",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2007-5846"
    },
    {
      "cve": "CVE-2008-6123",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2008-6123"
    },
    {
      "cve": "CVE-2011-1473",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-1473"
    },
    {
      "cve": "CVE-2011-5094",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-5094"
    },
    {
      "cve": "CVE-2012-6151",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2012-6151"
    },
    {
      "cve": "CVE-2014-10064",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-10064"
    },
    {
      "cve": "CVE-2014-2285",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2285"
    },
    {
      "cve": "CVE-2014-2310",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2310"
    },
    {
      "cve": "CVE-2014-3565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-3565"
    },
    {
      "cve": "CVE-2014-7191",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-7191"
    },
    {
      "cve": "CVE-2014-8882",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-8882"
    },
    {
      "cve": "CVE-2015-5621",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-5621"
    },
    {
      "cve": "CVE-2015-8100",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-8100"
    },
    {
      "cve": "CVE-2015-9262",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-9262"
    },
    {
      "cve": "CVE-2016-1000232",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-1000232"
    },
    {
      "cve": "CVE-2016-10540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-10540"
    },
    {
      "cve": "CVE-2016-4658",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-4658"
    },
    {
      "cve": "CVE-2017-1000048",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-1000048"
    },
    {
      "cve": "CVE-2017-15010",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-15010"
    },
    {
      "cve": "CVE-2018-18065",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-18065"
    },
    {
      "cve": "CVE-2018-20834",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-20834"
    },
    {
      "cve": "CVE-2018-3737",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-3737"
    },
    {
      "cve": "CVE-2018-7408",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-7408"
    },
    {
      "cve": "CVE-2019-10081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10081"
    },
    {
      "cve": "CVE-2019-10082",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10082"
    },
    {
      "cve": "CVE-2019-10092",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10092"
    },
    {
      "cve": "CVE-2019-10097",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10097"
    },
    {
      "cve": "CVE-2019-10098",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10098"
    },
    {
      "cve": "CVE-2019-11719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11719"
    },
    {
      "cve": "CVE-2019-11727",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11727"
    },
    {
      "cve": "CVE-2019-11756",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11756"
    },
    {
      "cve": "CVE-2019-16775",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16775"
    },
    {
      "cve": "CVE-2019-16776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16776"
    },
    {
      "cve": "CVE-2019-16777",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16777"
    },
    {
      "cve": "CVE-2019-17006",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17006"
    },
    {
      "cve": "CVE-2019-17023",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17023"
    },
    {
      "cve": "CVE-2019-17567",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17567"
    },
    {
      "cve": "CVE-2019-20149",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20149"
    },
    {
      "cve": "CVE-2019-20892",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20892"
    },
    {
      "cve": "CVE-2019-9517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-9517"
    },
    {
      "cve": "CVE-2020-11668",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11668"
    },
    {
      "cve": "CVE-2020-11984",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11984"
    },
    {
      "cve": "CVE-2020-11993",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11993"
    },
    {
      "cve": "CVE-2020-12362",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12362"
    },
    {
      "cve": "CVE-2020-12400",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12400"
    },
    {
      "cve": "CVE-2020-12401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12401"
    },
    {
      "cve": "CVE-2020-12402",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12402"
    },
    {
      "cve": "CVE-2020-12403",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12403"
    },
    {
      "cve": "CVE-2020-13938",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13938"
    },
    {
      "cve": "CVE-2020-13950",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13950"
    },
    {
      "cve": "CVE-2020-14145",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-14145"
    },
    {
      "cve": "CVE-2020-15861",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15861"
    },
    {
      "cve": "CVE-2020-15862",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15862"
    },
    {
      "cve": "CVE-2020-1927",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1927"
    },
    {
      "cve": "CVE-2020-1934",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1934"
    },
    {
      "cve": "CVE-2020-28469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28469"
    },
    {
      "cve": "CVE-2020-28502",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28502"
    },
    {
      "cve": "CVE-2020-35452",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-35452"
    },
    {
      "cve": "CVE-2020-36049",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-36049"
    },
    {
      "cve": "CVE-2020-6829",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-6829"
    },
    {
      "cve": "CVE-2020-7660",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7660"
    },
    {
      "cve": "CVE-2020-7754",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7754"
    },
    {
      "cve": "CVE-2020-7774",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7774"
    },
    {
      "cve": "CVE-2020-8648",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-9490",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-9490"
    },
    {
      "cve": "CVE-2021-22543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-2342",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2342"
    },
    {
      "cve": "CVE-2021-23440",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-23440"
    },
    {
      "cve": "CVE-2021-2356",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2356"
    },
    {
      "cve": "CVE-2021-2372",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2372"
    },
    {
      "cve": "CVE-2021-2385",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2385"
    },
    {
      "cve": "CVE-2021-2389",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2389"
    },
    {
      "cve": "CVE-2021-2390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2390"
    },
    {
      "cve": "CVE-2021-25745",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25745"
    },
    {
      "cve": "CVE-2021-25746",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25746"
    },
    {
      "cve": "CVE-2021-25748",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25748"
    },
    {
      "cve": "CVE-2021-26690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26690"
    },
    {
      "cve": "CVE-2021-26691",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26691"
    },
    {
      "cve": "CVE-2021-27290",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-27290"
    },
    {
      "cve": "CVE-2021-29469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-29469"
    },
    {
      "cve": "CVE-2021-30641",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-30641"
    },
    {
      "cve": "CVE-2021-31535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31535"
    },
    {
      "cve": "CVE-2021-31618",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31618"
    },
    {
      "cve": "CVE-2021-3177",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3177"
    },
    {
      "cve": "CVE-2021-32803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32803"
    },
    {
      "cve": "CVE-2021-32804",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32804"
    },
    {
      "cve": "CVE-2021-33033",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33034",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33034"
    },
    {
      "cve": "CVE-2021-33193",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33193"
    },
    {
      "cve": "CVE-2021-3347",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3347"
    },
    {
      "cve": "CVE-2021-33909",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-34798",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-36160",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-37701",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37701"
    },
    {
      "cve": "CVE-2021-37712",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37712"
    },
    {
      "cve": "CVE-2021-37713",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37713"
    },
    {
      "cve": "CVE-2021-3803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3803"
    },
    {
      "cve": "CVE-2021-39275",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2021-41524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41524"
    },
    {
      "cve": "CVE-2021-41773",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41773"
    },
    {
      "cve": "CVE-2021-42013",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-42013"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44225",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44225"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-44906",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44906"
    },
    {
      "cve": "CVE-2022-21245",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21245"
    },
    {
      "cve": "CVE-2022-21270",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21270"
    },
    {
      "cve": "CVE-2022-21303",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21303"
    },
    {
      "cve": "CVE-2022-21304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21304"
    },
    {
      "cve": "CVE-2022-21344",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21344"
    },
    {
      "cve": "CVE-2022-21367",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21367"
    },
    {
      "cve": "CVE-2022-21417",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21417"
    },
    {
      "cve": "CVE-2022-21427",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21427"
    },
    {
      "cve": "CVE-2022-21444",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21444"
    },
    {
      "cve": "CVE-2022-21451",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21451"
    },
    {
      "cve": "CVE-2022-21454",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21454"
    },
    {
      "cve": "CVE-2022-21460",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21460"
    },
    {
      "cve": "CVE-2022-21589",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21589"
    },
    {
      "cve": "CVE-2022-21592",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21592"
    },
    {
      "cve": "CVE-2022-21595",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21595"
    },
    {
      "cve": "CVE-2022-21608",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21608"
    },
    {
      "cve": "CVE-2022-21617",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21617"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-23471",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23471"
    },
    {
      "cve": "CVE-2022-23524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23524"
    },
    {
      "cve": "CVE-2022-23525",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23525"
    },
    {
      "cve": "CVE-2022-23526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23526"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-25147",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25147"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-2526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-2526"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26377",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-26377"
    },
    {
      "cve": "CVE-2022-28330",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28330"
    },
    {
      "cve": "CVE-2022-28614",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28614"
    },
    {
      "cve": "CVE-2022-28615",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28615"
    },
    {
      "cve": "CVE-2022-29167",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29167"
    },
    {
      "cve": "CVE-2022-29404",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29404"
    },
    {
      "cve": "CVE-2022-30522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30522"
    },
    {
      "cve": "CVE-2022-30556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30556"
    },
    {
      "cve": "CVE-2022-31813",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-31813"
    },
    {
      "cve": "CVE-2022-3517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-3564",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3564"
    },
    {
      "cve": "CVE-2022-36760",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2022-37434",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-37436",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37436"
    },
    {
      "cve": "CVE-2022-40674",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-40674"
    },
    {
      "cve": "CVE-2022-41741",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41741"
    },
    {
      "cve": "CVE-2022-41742",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41742"
    },
    {
      "cve": "CVE-2022-4203",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4203"
    },
    {
      "cve": "CVE-2022-4304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4304"
    },
    {
      "cve": "CVE-2022-4450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4450"
    },
    {
      "cve": "CVE-2022-46663",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-46663"
    },
    {
      "cve": "CVE-2022-4886",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4886"
    },
    {
      "cve": "CVE-2023-0215",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0215"
    },
    {
      "cve": "CVE-2023-0216",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0216"
    },
    {
      "cve": "CVE-2023-0217",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0217"
    },
    {
      "cve": "CVE-2023-0286",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0286"
    },
    {
      "cve": "CVE-2023-0401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0401"
    },
    {
      "cve": "CVE-2023-0464",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0464"
    },
    {
      "cve": "CVE-2023-0465",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0465"
    },
    {
      "cve": "CVE-2023-0466",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0466"
    },
    {
      "cve": "CVE-2023-0767",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0767"
    },
    {
      "cve": "CVE-2023-1255",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-1255"
    },
    {
      "cve": "CVE-2023-2002",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2002"
    },
    {
      "cve": "CVE-2023-20593",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-20593"
    },
    {
      "cve": "CVE-2023-21830",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21830"
    },
    {
      "cve": "CVE-2023-21840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21840"
    },
    {
      "cve": "CVE-2023-21843",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21843"
    },
    {
      "cve": "CVE-2023-21912",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21912"
    },
    {
      "cve": "CVE-2023-21963",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21963"
    },
    {
      "cve": "CVE-2023-21980",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21980"
    },
    {
      "cve": "CVE-2023-22025",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22025"
    },
    {
      "cve": "CVE-2023-22067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22067"
    },
    {
      "cve": "CVE-2023-22081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22081"
    },
    {
      "cve": "CVE-2023-22652",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22652"
    },
    {
      "cve": "CVE-2023-24329",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-25153",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25153"
    },
    {
      "cve": "CVE-2023-25173",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25173"
    },
    {
      "cve": "CVE-2023-25690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25690"
    },
    {
      "cve": "CVE-2023-2700",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2700"
    },
    {
      "cve": "CVE-2023-27522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-27522"
    },
    {
      "cve": "CVE-2023-2828",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2828"
    },
    {
      "cve": "CVE-2023-28840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28840"
    },
    {
      "cve": "CVE-2023-28841",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28841"
    },
    {
      "cve": "CVE-2023-28842",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28842"
    },
    {
      "cve": "CVE-2023-2975",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-30079",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30079"
    },
    {
      "cve": "CVE-2023-30630",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30630"
    },
    {
      "cve": "CVE-2023-3090",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3090"
    },
    {
      "cve": "CVE-2023-32067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32067"
    },
    {
      "cve": "CVE-2023-32360",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32360"
    },
    {
      "cve": "CVE-2023-32435",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32435"
    },
    {
      "cve": "CVE-2023-32439",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32439"
    },
    {
      "cve": "CVE-2023-32732",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32732"
    },
    {
      "cve": "CVE-2023-3341",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3341"
    },
    {
      "cve": "CVE-2023-3390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3390"
    },
    {
      "cve": "CVE-2023-33953",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-33953"
    },
    {
      "cve": "CVE-2023-34058",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34058"
    },
    {
      "cve": "CVE-2023-34059",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34059"
    },
    {
      "cve": "CVE-2023-3446",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-34969",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34969"
    },
    {
      "cve": "CVE-2023-35001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35001"
    },
    {
      "cve": "CVE-2023-35788",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35788"
    },
    {
      "cve": "CVE-2023-3611",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3611"
    },
    {
      "cve": "CVE-2023-37450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-37450"
    },
    {
      "cve": "CVE-2023-3776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3776"
    },
    {
      "cve": "CVE-2023-3817",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4004",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4004"
    },
    {
      "cve": "CVE-2023-4206",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4206"
    },
    {
      "cve": "CVE-2023-4207",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4207"
    },
    {
      "cve": "CVE-2023-4208",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4208"
    },
    {
      "cve": "CVE-2023-42753",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-42753"
    },
    {
      "cve": "CVE-2023-4785",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4785"
    },
    {
      "cve": "CVE-2023-4807",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-4863",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4863"
    },
    {
      "cve": "CVE-2023-5043",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5043"
    },
    {
      "cve": "CVE-2023-5129",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5129"
    },
    {
      "cve": "CVE-2023-5363",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2024-20918",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20918"
    },
    {
      "cve": "CVE-2024-20919",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20919"
    },
    {
      "cve": "CVE-2024-20921",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20921"
    },
    {
      "cve": "CVE-2024-20926",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20926"
    },
    {
      "cve": "CVE-2024-20932",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20932"
    },
    {
      "cve": "CVE-2024-20945",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20945"
    },
    {
      "cve": "CVE-2024-20952",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20952"
    },
    {
      "cve": "CVE-2024-39511",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39511"
    },
    {
      "cve": "CVE-2024-39512",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39512"
    },
    {
      "cve": "CVE-2024-39513",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39513"
    },
    {
      "cve": "CVE-2024-39514",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39514"
    },
    {
      "cve": "CVE-2024-39517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39517"
    },
    {
      "cve": "CVE-2024-39518",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39518"
    },
    {
      "cve": "CVE-2024-39519",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39519"
    },
    {
      "cve": "CVE-2024-39520",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39520"
    },
    {
      "cve": "CVE-2024-39521",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39521"
    },
    {
      "cve": "CVE-2024-39522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39522"
    },
    {
      "cve": "CVE-2024-39523",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39523"
    },
    {
      "cve": "CVE-2024-39524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39524"
    },
    {
      "cve": "CVE-2024-39528",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39528"
    },
    {
      "cve": "CVE-2024-39529",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39529"
    },
    {
      "cve": "CVE-2024-39530",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39530"
    },
    {
      "cve": "CVE-2024-39531",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39531"
    },
    {
      "cve": "CVE-2024-39532",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39532"
    },
    {
      "cve": "CVE-2024-39533",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39533"
    },
    {
      "cve": "CVE-2024-39535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39535"
    },
    {
      "cve": "CVE-2024-39536",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39536"
    },
    {
      "cve": "CVE-2024-39537",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39537"
    },
    {
      "cve": "CVE-2024-39538",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39538"
    },
    {
      "cve": "CVE-2024-39539",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39539"
    },
    {
      "cve": "CVE-2024-39540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39540"
    },
    {
      "cve": "CVE-2024-39541",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39541"
    },
    {
      "cve": "CVE-2024-39542",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39542"
    },
    {
      "cve": "CVE-2024-39543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39543"
    },
    {
      "cve": "CVE-2024-39545",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39545"
    },
    {
      "cve": "CVE-2024-39546",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39546"
    },
    {
      "cve": "CVE-2024-39548",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39548"
    },
    {
      "cve": "CVE-2024-39549",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39549"
    },
    {
      "cve": "CVE-2024-39550",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39550"
    },
    {
      "cve": "CVE-2024-39551",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39551"
    },
    {
      "cve": "CVE-2024-39553",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39553"
    },
    {
      "cve": "CVE-2024-39554",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39554"
    },
    {
      "cve": "CVE-2024-39555",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39555"
    },
    {
      "cve": "CVE-2024-39556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39556"
    },
    {
      "cve": "CVE-2024-39557",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39557"
    },
    {
      "cve": "CVE-2024-39558",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39558"
    },
    {
      "cve": "CVE-2024-39559",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39559"
    },
    {
      "cve": "CVE-2024-39560",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39560"
    },
    {
      "cve": "CVE-2024-39561",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39561"
    },
    {
      "cve": "CVE-2024-39565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39565"
    }
  ]
}
  WID-SEC-W-2022-0242
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um seine Privilegien zu erh\u00f6hen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- UNIX",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0242 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0242.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0242 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0242"
      },
      {
        "category": "external",
        "summary": "IBM X-Force Report on security vulnerabilities vom 2021-05-26",
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/202561"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-7wq5-phmq-m584 vom 2021-05-18",
        "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3044 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3044"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3057 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3057"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3088 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3088"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2645-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2646-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2643-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2647-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2644-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3057 vom 2021-08-12",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3057.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2678-1 vom 2021-08-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2687-1 vom 2021-08-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3173 vom 2021-08-17",
        "url": "https://access.redhat.com/errata/RHSA-2021:3173"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3181 vom 2021-08-17",
        "url": "https://access.redhat.com/errata/RHSA-2021:3181"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2746-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2695-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2756-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3235 vom 2021-08-20",
        "url": "https://access.redhat.com/errata/RHSA-2021:3235"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1699 vom 2021-08-24",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1699.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2021-108 vom 2021-08-25",
        "url": "https://downloads.avaya.com/css/P8/documents/101077238"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3361 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3361"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3375 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3375"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3363 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3363"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3380 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3380"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3262 vom 2021-09-01",
        "url": "https://access.redhat.com/errata/RHSA-2021:3262"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3454 vom 2021-09-08",
        "url": "https://access.redhat.com/errata/RHSA-2021:3454"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5070-1 vom 2021-09-09",
        "url": "https://ubuntu.com/security/notices/USN-5070-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-1 vom 2021-09-09",
        "url": "https://ubuntu.com/security/notices/USN-5071-1"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9451 vom 2021-09-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9451.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9450 vom 2021-09-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9450.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-2 vom 2021-09-16",
        "url": "https://ubuntu.com/security/notices/USN-5071-2"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9453 vom 2021-09-21",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9453.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9452 vom 2021-09-21",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9452.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3598 vom 2021-09-21",
        "url": "https://access.redhat.com/errata/RHSA-2021:3598"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-3 vom 2021-09-22",
        "url": "https://ubuntu.com/security/notices/USN-5071-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5094-1 vom 2021-09-29",
        "url": "https://ubuntu.com/security/notices/USN-5094-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5094-2 vom 2021-09-30",
        "url": "https://ubuntu.com/security/notices/USN-5094-2"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1539 vom 2021-10-05",
        "url": "https://alas.aws.amazon.com/ALAS-2021-1539.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3725 vom 2021-10-05",
        "url": "https://access.redhat.com/errata/RHSA-2021:3725"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5106-1 vom 2021-10-06",
        "url": "https://ubuntu.com/security/notices/USN-5106-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3767 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3767"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3766 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3766"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3768 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3768"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3801 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3801"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3802 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3802"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3814 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3814"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3812 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3812"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3801 vom 2021-10-13",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3801.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2785 vom 2021-10-16",
        "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3943 vom 2021-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2021:3943"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5120-1 vom 2021-10-22",
        "url": "https://ubuntu.com/security/notices/USN-5120-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3987 vom 2021-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2021:3987"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:4000 vom 2021-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2021:4000"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2021:3801 vom 2021-11-17",
        "url": "https://lists.centos.org/pipermail/centos-announce/2021-November/048398.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3876-1 vom 2021-12-02",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3969-1 vom 2021-12-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3972-1 vom 2021-12-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2843 vom 2021-12-16",
        "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-004 vom 2022-01-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-004.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-002 vom 2022-01-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-002.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2022-001 vom 2022-06-10",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-001.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2022-2022-083 vom 2022-06-13",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-083.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:5640 vom 2022-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2022:5640"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9999 vom 2022-11-16",
        "url": "http://linux.oracle.com/errata/ELSA-2022-9999.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2023-023 vom 2023-07-13",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2023-023.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2023-036 vom 2023-07-13",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-036.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-076 vom 2024-07-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-076.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
      },
      {
        "category": "external",
        "summary": "Dell Security Update vom 2025-10-02",
        "url": "https://www.dell.com/support/kbdoc/000376224"
      }
    ],
    "source_lang": "en-US",
    "title": "Linux Kernel: Schwachstelle erm\u00f6glicht Privilegieneskalation",
    "tracking": {
      "current_release_date": "2025-10-01T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-02T08:18:17.104+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2022-0242",
      "initial_release_date": "2021-05-26T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2021-05-26T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2021-08-09T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-10T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2021-08-11T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-08-12T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-15T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-16T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-17T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-19T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-24T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-08-26T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2021-08-30T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-01T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-07T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-08T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-16T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-20T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-09-21T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-28T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-30T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-04T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-10-06T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-11T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-12T22:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-13T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-10-17T22:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-19T22:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-21T22:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-25T22:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-26T22:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-11-17T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2021-12-02T23:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-07T23:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-08T23:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-16T23:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2022-01-30T23:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-09T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-13T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-07-19T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-11-16T23:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-07-13T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-07-31T22:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-03-11T23:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-10-01T22:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "44"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Experience Portal",
            "product": {
              "name": "Avaya Aura Experience Portal",
              "product_id": "T015519",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_experience_portal:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
                  "product_id": "T045879"
                }
              },
              {
                "category": "product_version",
                "name": "8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.4.0.0",
                  "product_id": "T045879-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
                  "product_id": "T045881"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.70",
                  "product_id": "T045881-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
                  "product_id": "T047343"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.40",
                  "product_id": "T047343-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
                  "product_id": "T047344"
                }
              },
              {
                "category": "product_version",
                "name": "8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.3.1.10",
                  "product_id": "T047344-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source Linux Kernel",
            "product": {
              "name": "Open Source Linux Kernel",
              "product_id": "6368",
              "product_identification_helper": {
                "cpe": "cpe:/o:linux:linux_kernel:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "product_status": {
        "known_affected": [
          "T015519",
          "67646",
          "6368",
          "T004914",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T047343",
          "398363",
          "1727",
          "T045881",
          "T047344"
        ]
      },
      "release_date": "2021-05-26T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    }
  ]
}
  wid-sec-w-2022-0242
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um seine Privilegien zu erh\u00f6hen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- UNIX",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0242 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0242.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0242 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0242"
      },
      {
        "category": "external",
        "summary": "IBM X-Force Report on security vulnerabilities vom 2021-05-26",
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/202561"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-7wq5-phmq-m584 vom 2021-05-18",
        "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3044 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3044"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3057 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3057"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3088 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3088"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2645-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2646-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2643-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2647-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2644-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3057 vom 2021-08-12",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3057.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2678-1 vom 2021-08-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2687-1 vom 2021-08-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3173 vom 2021-08-17",
        "url": "https://access.redhat.com/errata/RHSA-2021:3173"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3181 vom 2021-08-17",
        "url": "https://access.redhat.com/errata/RHSA-2021:3181"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2746-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2695-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2756-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3235 vom 2021-08-20",
        "url": "https://access.redhat.com/errata/RHSA-2021:3235"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1699 vom 2021-08-24",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1699.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2021-108 vom 2021-08-25",
        "url": "https://downloads.avaya.com/css/P8/documents/101077238"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3361 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3361"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3375 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3375"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3363 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3363"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3380 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3380"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3262 vom 2021-09-01",
        "url": "https://access.redhat.com/errata/RHSA-2021:3262"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3454 vom 2021-09-08",
        "url": "https://access.redhat.com/errata/RHSA-2021:3454"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5070-1 vom 2021-09-09",
        "url": "https://ubuntu.com/security/notices/USN-5070-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-1 vom 2021-09-09",
        "url": "https://ubuntu.com/security/notices/USN-5071-1"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9451 vom 2021-09-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9451.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9450 vom 2021-09-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9450.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-2 vom 2021-09-16",
        "url": "https://ubuntu.com/security/notices/USN-5071-2"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9453 vom 2021-09-21",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9453.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9452 vom 2021-09-21",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9452.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3598 vom 2021-09-21",
        "url": "https://access.redhat.com/errata/RHSA-2021:3598"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-3 vom 2021-09-22",
        "url": "https://ubuntu.com/security/notices/USN-5071-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5094-1 vom 2021-09-29",
        "url": "https://ubuntu.com/security/notices/USN-5094-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5094-2 vom 2021-09-30",
        "url": "https://ubuntu.com/security/notices/USN-5094-2"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1539 vom 2021-10-05",
        "url": "https://alas.aws.amazon.com/ALAS-2021-1539.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3725 vom 2021-10-05",
        "url": "https://access.redhat.com/errata/RHSA-2021:3725"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5106-1 vom 2021-10-06",
        "url": "https://ubuntu.com/security/notices/USN-5106-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3767 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3767"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3766 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3766"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3768 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3768"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3801 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3801"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3802 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3802"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3814 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3814"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3812 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3812"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3801 vom 2021-10-13",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3801.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2785 vom 2021-10-16",
        "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3943 vom 2021-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2021:3943"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5120-1 vom 2021-10-22",
        "url": "https://ubuntu.com/security/notices/USN-5120-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3987 vom 2021-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2021:3987"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:4000 vom 2021-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2021:4000"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2021:3801 vom 2021-11-17",
        "url": "https://lists.centos.org/pipermail/centos-announce/2021-November/048398.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3876-1 vom 2021-12-02",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3969-1 vom 2021-12-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3972-1 vom 2021-12-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2843 vom 2021-12-16",
        "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-004 vom 2022-01-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-004.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-002 vom 2022-01-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-002.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2022-001 vom 2022-06-10",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-001.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2022-2022-083 vom 2022-06-13",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-083.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:5640 vom 2022-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2022:5640"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9999 vom 2022-11-16",
        "url": "http://linux.oracle.com/errata/ELSA-2022-9999.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2023-023 vom 2023-07-13",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2023-023.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2023-036 vom 2023-07-13",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-036.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-076 vom 2024-07-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-076.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
      },
      {
        "category": "external",
        "summary": "Dell Security Update vom 2025-10-02",
        "url": "https://www.dell.com/support/kbdoc/000376224"
      }
    ],
    "source_lang": "en-US",
    "title": "Linux Kernel: Schwachstelle erm\u00f6glicht Privilegieneskalation",
    "tracking": {
      "current_release_date": "2025-10-01T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-02T08:18:17.104+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2022-0242",
      "initial_release_date": "2021-05-26T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2021-05-26T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2021-08-09T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-10T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2021-08-11T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-08-12T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-15T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-16T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-17T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-19T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-24T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-08-26T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2021-08-30T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-01T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-07T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-08T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-16T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-20T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-09-21T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-28T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-30T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-04T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-10-06T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-11T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-12T22:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-13T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-10-17T22:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-19T22:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-21T22:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-25T22:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-26T22:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-11-17T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2021-12-02T23:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-07T23:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-08T23:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-16T23:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2022-01-30T23:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-09T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-13T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-07-19T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-11-16T23:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-07-13T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-07-31T22:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-03-11T23:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-10-01T22:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "44"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Experience Portal",
            "product": {
              "name": "Avaya Aura Experience Portal",
              "product_id": "T015519",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_experience_portal:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
                  "product_id": "T045879"
                }
              },
              {
                "category": "product_version",
                "name": "8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.4.0.0",
                  "product_id": "T045879-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
                  "product_id": "T045881"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.70",
                  "product_id": "T045881-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
                  "product_id": "T047343"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.40",
                  "product_id": "T047343-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
                  "product_id": "T047344"
                }
              },
              {
                "category": "product_version",
                "name": "8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.3.1.10",
                  "product_id": "T047344-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source Linux Kernel",
            "product": {
              "name": "Open Source Linux Kernel",
              "product_id": "6368",
              "product_identification_helper": {
                "cpe": "cpe:/o:linux:linux_kernel:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "product_status": {
        "known_affected": [
          "T015519",
          "67646",
          "6368",
          "T004914",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T047343",
          "398363",
          "1727",
          "T045881",
          "T047344"
        ]
      },
      "release_date": "2021-05-26T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    }
  ]
}
  WID-SEC-W-2022-0243
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.\r\nRed Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.\r\nVirtualization ist eine Virtualisierungsl\u00f6sung von Red Hat, die die simultane Ausf\u00fchrung von verschiedenen Betriebssystemen auf einem Host-System erm\u00f6glicht.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel, Red Hat Enterprise Linux und Red Hat Virtualization ausnutzen, um seine Privilegien zu erh\u00f6hen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- UNIX",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0243 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0243.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0243 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0243"
      },
      {
        "category": "external",
        "summary": "Openwall Security Report vom 2021-06-27",
        "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
      },
      {
        "category": "external",
        "summary": "Red Hat Customer Portal vom 2021-06-27",
        "url": "https://access.redhat.com/security/cve/cve-2021-22543"
      },
      {
        "category": "external",
        "summary": "Github Linux KVM vom 2021-06-27",
        "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3044 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3044"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3057 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3057"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2644-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2645-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2646-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2647-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2643-1 vom 2021-08-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3088 vom 2021-08-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:3088"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3057 vom 2021-08-12",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3057.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2678-1 vom 2021-08-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2687-1 vom 2021-08-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3173 vom 2021-08-17",
        "url": "https://access.redhat.com/errata/RHSA-2021:3173"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3181 vom 2021-08-17",
        "url": "https://access.redhat.com/errata/RHSA-2021:3181"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2695-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2756-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:2746-1 vom 2021-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3235 vom 2021-08-20",
        "url": "https://access.redhat.com/errata/RHSA-2021:3235"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1699 vom 2021-08-24",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1699.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2021-108 vom 2021-08-25",
        "url": "https://downloads.avaya.com/css/P8/documents/101077238"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3361 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3361"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3375 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3375"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3363 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3363"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3380 vom 2021-08-31",
        "url": "https://access.redhat.com/errata/RHSA-2021:3380"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3262 vom 2021-09-01",
        "url": "https://access.redhat.com/errata/RHSA-2021:3262"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3454 vom 2021-09-08",
        "url": "https://access.redhat.com/errata/RHSA-2021:3454"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-1 vom 2021-09-09",
        "url": "https://ubuntu.com/security/notices/USN-5071-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5070-1 vom 2021-09-09",
        "url": "https://ubuntu.com/security/notices/USN-5070-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-2 vom 2021-09-16",
        "url": "https://ubuntu.com/security/notices/USN-5071-2"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9451 vom 2021-09-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9451.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9450 vom 2021-09-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9450.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9452 vom 2021-09-21",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9452.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9453 vom 2021-09-21",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9453.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3598 vom 2021-09-21",
        "url": "https://access.redhat.com/errata/RHSA-2021:3598"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5071-3 vom 2021-09-22",
        "url": "https://ubuntu.com/security/notices/USN-5071-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5094-2 vom 2021-09-30",
        "url": "https://ubuntu.com/security/notices/USN-5094-2"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1539 vom 2021-10-05",
        "url": "https://alas.aws.amazon.com/ALAS-2021-1539.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3725 vom 2021-10-05",
        "url": "https://access.redhat.com/errata/RHSA-2021:3725"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5106-1 vom 2021-10-06",
        "url": "https://ubuntu.com/security/notices/USN-5106-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3768 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3768"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3767 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3767"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3766 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3766"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3801 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3801"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3814 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3814"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3802 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3802"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3812 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3812"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3801 vom 2021-10-13",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3801.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2785 vom 2021-10-16",
        "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3943 vom 2021-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2021:3943"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5120-1 vom 2021-10-22",
        "url": "https://ubuntu.com/security/notices/USN-5120-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3987 vom 2021-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2021:3987"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:4000 vom 2021-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2021:4000"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2021:3801 vom 2021-11-17",
        "url": "https://lists.centos.org/pipermail/centos-announce/2021-November/048398.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3969-1 vom 2021-12-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3972-1 vom 2021-12-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2843 vom 2021-12-16",
        "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-002 vom 2022-01-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-002.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-004 vom 2022-01-31",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-004.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2022-001 vom 2022-06-10",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-001.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2022-2022-083 vom 2022-06-13",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-083.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:5640 vom 2022-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2022:5640"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2023-023 vom 2023-07-13",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2023-023.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2023-036 vom 2023-07-13",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-036.html"
      },
      {
        "category": "external",
        "summary": "Dell Security Update vom 2025-10-02",
        "url": "https://www.dell.com/support/kbdoc/000376224"
      }
    ],
    "source_lang": "en-US",
    "title": "Linux Kernel: Schwachstelle erm\u00f6glicht Privilegieneskalation",
    "tracking": {
      "current_release_date": "2025-10-01T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-02T08:18:22.395+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2022-0243",
      "initial_release_date": "2021-06-27T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2021-06-27T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2021-08-09T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-10T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2021-08-11T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-08-12T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-15T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-16T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-17T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-08-19T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-08-24T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-08-26T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2021-08-30T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-01T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-07T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-09-08T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-16T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
        },
        {
          "date": "2021-09-20T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-09-21T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-30T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-04T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-10-06T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-11T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-12T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-13T22:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-10-17T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-19T22:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-21T22:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-10-25T22:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-26T22:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-11-17T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2021-12-07T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-08T23:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-16T23:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2022-01-30T23:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-09T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-13T22:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-07-19T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-13T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-10-01T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "39"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Experience Portal",
            "product": {
              "name": "Avaya Aura Experience Portal",
              "product_id": "T015519",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_experience_portal:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
                  "product_id": "T045879"
                }
              },
              {
                "category": "product_version",
                "name": "8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.4.0.0",
                  "product_id": "T045879-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
                  "product_id": "T045881"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.70",
                  "product_id": "T045881-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
                  "product_id": "T047343"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.40",
                  "product_id": "T047343-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
                  "product_id": "T047344"
                }
              },
              {
                "category": "product_version",
                "name": "8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.3.1.10",
                  "product_id": "T047344-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source Linux Kernel",
            "product": {
              "name": "Open Source Linux Kernel",
              "product_id": "6368",
              "product_identification_helper": {
                "cpe": "cpe:/o:linux:linux_kernel:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7",
                "product": {
                  "name": "Red Hat Enterprise Linux 7",
                  "product_id": "T003303",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "8",
                "product": {
                  "name": "Red Hat Enterprise Linux 8",
                  "product_id": "T014111",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "4",
                "product": {
                  "name": "Red Hat Virtualization 4",
                  "product_id": "T013699",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:virtualization:4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Virtualization"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-22543",
      "product_status": {
        "known_affected": [
          "T015519",
          "6368",
          "T013699",
          "T003303",
          "T004914",
          "T014111",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T047343",
          "398363",
          "1727",
          "T045881",
          "T047344"
        ]
      },
      "release_date": "2021-06-27T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    }
  ]
}
  var-202105-1451
Vulnerability from variot
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. Linux Kernel Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Arch Linux is an application system of Arch open source. A lightweight and flexible Linux® distribution that tries to keep it simple. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Bug Fix(es):
- Rebase package(s) to version: 1.2.23
 
Highlights, important fixes, or notable enhancements:
- 
imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397)
 - 
RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177)
 - 
8) - x86_64
 - 
Description:
 
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Bug Fix(es):
- 
kernel-rt: update RT source tree to the RHEL-8.4.z source tree (BZ#1985050)
 - 
kernel-rt: Merge mm/memcg: Fix kmem_cache_alloc() performance regression (BZ#1987102)
 - 
8.1) - ppc64le, x86_64
 - 
Description:
 
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.1/html/release_notes/
Security fixes:
- 
redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
 - 
redis: Integer overflow issue with Streams (CVE-2021-32627)
 - 
redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
 - 
redis: Integer overflow issue with intsets (CVE-2021-32687)
 - 
redis: Integer overflow issue with strings (CVE-2021-41099)
 - 
redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
 - 
redis: Out of bounds read in lua debugger protocol parser (CVE-2021-32672)
 
For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Container updates:
- 
RHACM 2.1.12 images (BZ# 2007489)
 - 
Solution:
 
Before applying this update, make sure all previously released errata relevant to your system have been applied. To apply this upgrade, you must upgrade your OpenShift Container Platform version to 4.6, or later. Bugs fixed (https://bugzilla.redhat.com/):
2007489 - RHACM 2.1.12 images 2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets 2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request 2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser 2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure 2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams 2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack 2011020 - CVE-2021-41099 redis: Integer overflow issue with strings
Bug Fix(es):
- 
[CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)
 - 
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
 
====================================================================                 
Red Hat Security Advisory
Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2021:3363-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3363 Issue date: 2021-08-31 CVE Names: CVE-2021-3609 CVE-2021-22543 CVE-2021-22555 CVE-2021-32399 ==================================================================== 1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
 
Red Hat CodeReady Linux Builder EUS (v. 8.2) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS EUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64
- Description:
 
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- 
kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)
 - 
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)
 - 
kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)
 - 
kernel: race condition for removal of the HCI controller (CVE-2021-32399)
 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- 
[Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)
 - 
Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)
 - 
s390/uv: Fix handling of length extensions (BZ#1975657)
 - 
RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id's over 8 (BZ#1976265)
 - 
Backport "tick/nohz: Conditionally restart tick on idle exit" to RHEL 8.5 (BZ#1978711)
 - 
rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)
 - 
xfrm: backports from upstream (BZ#1981841)
 
Enhancement(s):
- 
[8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)
 - 
Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)
 - 
Solution:
 
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
 
1965461 - CVE-2021-22543 kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks 1970807 - CVE-2021-32399 kernel: race condition for removal of the HCI controller 1971651 - CVE-2021-3609 kernel: race condition in net/can/bcm.c leads to local privilege escalation 1980101 - CVE-2021-22555 kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c
- Package List:
 
Red Hat Enterprise Linux BaseOS EUS (v. 8.2):
Source: kernel-4.18.0-193.64.1.el8_2.src.rpm
aarch64: bpftool-4.18.0-193.64.1.el8_2.aarch64.rpm bpftool-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-core-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-cross-headers-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-core-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-devel-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-modules-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-devel-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-headers-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-modules-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-modules-extra-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-libs-4.18.0-193.64.1.el8_2.aarch64.rpm perf-4.18.0-193.64.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm python3-perf-4.18.0-193.64.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
noarch: kernel-abi-whitelists-4.18.0-193.64.1.el8_2.noarch.rpm kernel-doc-4.18.0-193.64.1.el8_2.noarch.rpm
ppc64le: bpftool-4.18.0-193.64.1.el8_2.ppc64le.rpm bpftool-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-core-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-cross-headers-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-core-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-modules-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-headers-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-modules-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-modules-extra-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-libs-4.18.0-193.64.1.el8_2.ppc64le.rpm perf-4.18.0-193.64.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm python3-perf-4.18.0-193.64.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
s390x: bpftool-4.18.0-193.64.1.el8_2.s390x.rpm bpftool-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-4.18.0-193.64.1.el8_2.s390x.rpm kernel-core-4.18.0-193.64.1.el8_2.s390x.rpm kernel-cross-headers-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-core-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-devel-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-modules-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-193.64.1.el8_2.s390x.rpm kernel-devel-4.18.0-193.64.1.el8_2.s390x.rpm kernel-headers-4.18.0-193.64.1.el8_2.s390x.rpm kernel-modules-4.18.0-193.64.1.el8_2.s390x.rpm kernel-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm kernel-tools-4.18.0-193.64.1.el8_2.s390x.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-core-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-devel-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-modules-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm perf-4.18.0-193.64.1.el8_2.s390x.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm python3-perf-4.18.0-193.64.1.el8_2.s390x.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm
x86_64: bpftool-4.18.0-193.64.1.el8_2.x86_64.rpm bpftool-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-core-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-cross-headers-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-core-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-devel-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-modules-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-devel-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-headers-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-modules-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-modules-extra-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-libs-4.18.0-193.64.1.el8_2.x86_64.rpm perf-4.18.0-193.64.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm python3-perf-4.18.0-193.64.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
Red Hat CodeReady Linux Builder EUS (v. 8.2):
aarch64: bpftool-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-libs-devel-4.18.0-193.64.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
ppc64le: bpftool-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-libs-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
x86_64: bpftool-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-libs-devel-4.18.0-193.64.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
 
https://access.redhat.com/security/cve/CVE-2021-3609 https://access.redhat.com/security/cve/CVE-2021-22543 https://access.redhat.com/security/cve/CVE-2021-22555 https://access.redhat.com/security/cve/CVE-2021-32399 https://access.redhat.com/security/updates/classification/#important
- Contact:
 
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYS31B9zjgjWX9erEAQgW+g/+J99Y+Y7e8ycInntMh7wHvU3/48D0LHEh HZo1cy4MY9GvBX5ijfFZKvQR2TLGZR0fa5driCzQ/4WW2RwUjRExpIdOLPEKqKwd iaYXAM7LJctQX3V3lW3f+fwLxz04lxOCzXdmbBgQIsVVX4nflCEF6htIIINW5Kp8 49i1h7ca0dMRwAh9OTPw59Z0WrVB7C+jkr9kUr+rYuJz389PCPvfpzkksRHZ3wEf veunhvMhPSbambyqnFbBfpxQ5523qx0nXaHQ24WYg3DkRaWhw/1jwSqUxIQPaxJR sYv9jQ1hwW8JNg4TxuCrEK4PPgRaMK2NXMmqAXY7dHQudTOIwxy4zzxH7ptYkylL I/NJ+sD3WbN1LmnT+fU/zy/etPyRtHIucdvpnzYIV7NUgg7h9E10e+yg5d4MIe1/ FN/oyEiScNHMxqlHrWeVIq9LXabf8IhZFwYJyJLagCIYAMIlN6LFfAwUFoK+0Fjj azg7GWirLC31paNlLmEJPiVYT13TqINkntt7oXcvJeV0KPT+w6MtCkUQuiPW/ZNP RWMQd2vvqYGLjL4Osw74uzdP1potEZFupUoxMUJpmc1gXMxAPr4HwdgpUbwsggaX p+COJJlj0rXgKbRyBpjpJ5px+s92zYQ/6yOGOQO7Q4txXgYQb3TO7fzzoVAs7JfX SscZLhxIDUg=PDEr -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202105-1451",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "h300s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "h410s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "34"
      },
      {
        "model": "solidfire baseboard management controller",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "h410c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "h500e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "h700s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2021-05-18"
      },
      {
        "model": "h300e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "33"
      },
      {
        "model": "cloud backup",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "h700e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "h500s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "kernel",
        "scope": null,
        "trust": 0.8,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "solidfire baseboard management controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "baseboard management controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "fedora",
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22543"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "164562"
      },
      {
        "db": "PACKETSTORM",
        "id": "163926"
      },
      {
        "db": "PACKETSTORM",
        "id": "163770"
      },
      {
        "db": "PACKETSTORM",
        "id": "163972"
      },
      {
        "db": "PACKETSTORM",
        "id": "163861"
      },
      {
        "db": "PACKETSTORM",
        "id": "164583"
      },
      {
        "db": "PACKETSTORM",
        "id": "164412"
      },
      {
        "db": "PACKETSTORM",
        "id": "163995"
      }
    ],
    "trust": 0.8
  },
  "cve": "CVE-2021-22543",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-22543",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-380980",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2021-22543",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2021-22543",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-22543",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-22543",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202105-1684",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-380980",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-22543",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380980"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-1684"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22543"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. Linux Kernel Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Arch Linux is an application system of Arch open source. A lightweight and flexible Linux\u00ae distribution that tries to keep it simple. \nThese packages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. RHVH features a Cockpit user interface for\nmonitoring the host\u0027s resources and performing administrative tasks. \n\nBug Fix(es):\n\n* Rebase package(s) to version: 1.2.23\n\nHighlights, important fixes, or notable enhancements: \n\n* imgbase should not copy the selinux binary policy file (BZ# 1979624)\n(BZ#1989397)\n\n* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. \n(BZ#1975177)\n\n4. 8) - x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z source tree\n(BZ#1985050)\n\n* kernel-rt: Merge mm/memcg: Fix kmem_cache_alloc() performance regression\n(BZ#1987102)\n\n4. 8.1) - ppc64le, x86_64\n\n3. Description:\n\nThis is a kernel live patch module which is automatically loaded by the RPM\npost-install script to modify the code of a running kernel. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.1.12 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in. See the following Release Notes\ndocumentation, which will be updated shortly for this release, for\nadditional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.1/html/release_notes/\n\nSecurity fixes:\n\n* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)\n\n* redis: Integer overflow issue with Streams (CVE-2021-32627)\n\n* redis: Integer overflow bug in the ziplist data structure\n(CVE-2021-32628)\n\n* redis: Integer overflow issue with intsets (CVE-2021-32687)\n\n* redis: Integer overflow issue with strings (CVE-2021-41099)\n\n* redis: Denial of service via Redis Standard Protocol (RESP) request\n(CVE-2021-32675)\n\n* redis: Out of bounds read in lua debugger protocol parser\n(CVE-2021-32672)\n\nFor more details about the security issues, including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nContainer updates:\n\n* RHACM 2.1.12 images (BZ# 2007489)\n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. To apply this upgrade,\nyou \nmust upgrade your OpenShift Container Platform version to 4.6, or later. Bugs fixed (https://bugzilla.redhat.com/):\n\n2007489 - RHACM 2.1.12 images\n2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets\n2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request\n2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser\n2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure\n2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams\n2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack\n2011020 - CVE-2021-41099 redis: Integer overflow issue with strings\n\n5. \n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap\n[7.9.z] (BZ#1975161)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: kernel security, bug fix, and enhancement update\nAdvisory ID:       RHSA-2021:3363-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:3363\nIssue date:        2021-08-31\nCVE Names:         CVE-2021-3609 CVE-2021-22543 CVE-2021-22555\n                   CVE-2021-32399\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 8.2\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat CodeReady Linux Builder EUS (v. 8.2) - aarch64, ppc64le, x86_64\nRed Hat Enterprise Linux BaseOS EUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege\nescalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO\nchecks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in\nnet/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to\nadd memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e  25G\ninterfaces. 10G interfaces seem to be correct. Ethtool version is 5.0\n(BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in\nLUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5\n(BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel\nWARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and\nassorted bug fixes (BZ#1980795)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1965461 - CVE-2021-22543 kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks\n1970807 - CVE-2021-32399 kernel: race condition for removal of the HCI controller\n1971651 - CVE-2021-3609 kernel: race condition in net/can/bcm.c leads to local privilege escalation\n1980101 - CVE-2021-22555 kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c\n\n6. Package List:\n\nRed Hat Enterprise Linux BaseOS EUS (v. 8.2):\n\nSource:\nkernel-4.18.0-193.64.1.el8_2.src.rpm\n\naarch64:\nbpftool-4.18.0-193.64.1.el8_2.aarch64.rpm\nbpftool-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-core-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-cross-headers-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debug-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debug-core-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debug-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debug-devel-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debug-modules-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debug-modules-extra-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-devel-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-headers-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-modules-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-modules-extra-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-tools-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-tools-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-tools-libs-4.18.0-193.64.1.el8_2.aarch64.rpm\nperf-4.18.0-193.64.1.el8_2.aarch64.rpm\nperf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\npython3-perf-4.18.0-193.64.1.el8_2.aarch64.rpm\npython3-perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\n\nnoarch:\nkernel-abi-whitelists-4.18.0-193.64.1.el8_2.noarch.rpm\nkernel-doc-4.18.0-193.64.1.el8_2.noarch.rpm\n\nppc64le:\nbpftool-4.18.0-193.64.1.el8_2.ppc64le.rpm\nbpftool-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-core-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-cross-headers-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debug-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debug-core-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debug-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debug-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debug-modules-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debug-modules-extra-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-headers-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-modules-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-modules-extra-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-tools-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-tools-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-tools-libs-4.18.0-193.64.1.el8_2.ppc64le.rpm\nperf-4.18.0-193.64.1.el8_2.ppc64le.rpm\nperf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\npython3-perf-4.18.0-193.64.1.el8_2.ppc64le.rpm\npython3-perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\n\ns390x:\nbpftool-4.18.0-193.64.1.el8_2.s390x.rpm\nbpftool-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-core-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-cross-headers-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-debug-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-debug-core-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-debug-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-debug-devel-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-debug-modules-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-debug-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-debuginfo-common-s390x-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-devel-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-headers-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-modules-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-tools-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-tools-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-zfcpdump-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-zfcpdump-core-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-zfcpdump-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-zfcpdump-devel-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-zfcpdump-modules-4.18.0-193.64.1.el8_2.s390x.rpm\nkernel-zfcpdump-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm\nperf-4.18.0-193.64.1.el8_2.s390x.rpm\nperf-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm\npython3-perf-4.18.0-193.64.1.el8_2.s390x.rpm\npython3-perf-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm\n\nx86_64:\nbpftool-4.18.0-193.64.1.el8_2.x86_64.rpm\nbpftool-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-core-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-cross-headers-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debug-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debug-core-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debug-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debug-devel-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debug-modules-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debug-modules-extra-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debuginfo-common-x86_64-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-devel-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-headers-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-modules-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-modules-extra-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-tools-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-tools-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-tools-libs-4.18.0-193.64.1.el8_2.x86_64.rpm\nperf-4.18.0-193.64.1.el8_2.x86_64.rpm\nperf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\npython3-perf-4.18.0-193.64.1.el8_2.x86_64.rpm\npython3-perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\n\nRed Hat CodeReady Linux Builder EUS (v. 8.2):\n\naarch64:\nbpftool-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debug-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-tools-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\nkernel-tools-libs-devel-4.18.0-193.64.1.el8_2.aarch64.rpm\nperf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\npython3-perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm\n\nppc64le:\nbpftool-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debug-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-tools-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\nkernel-tools-libs-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm\nperf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\npython3-perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm\n\nx86_64:\nbpftool-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debug-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-debuginfo-common-x86_64-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-tools-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\nkernel-tools-libs-devel-4.18.0-193.64.1.el8_2.x86_64.rpm\nperf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\npython3-perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-3609\nhttps://access.redhat.com/security/cve/CVE-2021-22543\nhttps://access.redhat.com/security/cve/CVE-2021-22555\nhttps://access.redhat.com/security/cve/CVE-2021-32399\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nSscZLhxIDUg=PDEr\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-22543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      },
      {
        "db": "VULHUB",
        "id": "VHN-380980"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22543"
      },
      {
        "db": "PACKETSTORM",
        "id": "164562"
      },
      {
        "db": "PACKETSTORM",
        "id": "163926"
      },
      {
        "db": "PACKETSTORM",
        "id": "163770"
      },
      {
        "db": "PACKETSTORM",
        "id": "163972"
      },
      {
        "db": "PACKETSTORM",
        "id": "163861"
      },
      {
        "db": "PACKETSTORM",
        "id": "164583"
      },
      {
        "db": "PACKETSTORM",
        "id": "164412"
      },
      {
        "db": "PACKETSTORM",
        "id": "163995"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-22543",
        "trust": 4.2
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/06/26/1",
        "trust": 1.8
      },
      {
        "db": "PACKETSTORM",
        "id": "164583",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "164589",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "164666",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "167858",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "164562",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163995",
        "trust": 0.7
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/05/26/3",
        "trust": 0.6
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/05/26/4",
        "trust": 0.6
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/05/26/5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3485",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3324",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3034",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.3626",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2959",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3372",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2764",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3536",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3173",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3554",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4163",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3249",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3389",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3015",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2899",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4156",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2691",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3137",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4282",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3456",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4089",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3499",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2789",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164331",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "163865",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164098",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164076",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164223",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164431",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164186",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164028",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164484",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164237",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "163767",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164477",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021082206",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021083123",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021111726",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022072069",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021102111",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021090126",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021101336",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022020931",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021100618",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-1684",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164652",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-380980",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22543",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163926",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163770",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163972",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163861",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "164412",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380980"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      },
      {
        "db": "PACKETSTORM",
        "id": "164562"
      },
      {
        "db": "PACKETSTORM",
        "id": "163926"
      },
      {
        "db": "PACKETSTORM",
        "id": "163770"
      },
      {
        "db": "PACKETSTORM",
        "id": "163972"
      },
      {
        "db": "PACKETSTORM",
        "id": "163861"
      },
      {
        "db": "PACKETSTORM",
        "id": "164583"
      },
      {
        "db": "PACKETSTORM",
        "id": "164412"
      },
      {
        "db": "PACKETSTORM",
        "id": "163995"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-1684"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22543"
      }
    ]
  },
  "id": "VAR-202105-1451",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380980"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-29T22:04:34.245000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Linux\u00a0Kernel\u00a0Archives NetAppNetApp\u00a0Advisory",
        "trust": 0.8,
        "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
      },
      {
        "title": "Red Hat: Important: kernel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20225640 - Security Advisory"
      },
      {
        "title": "Red Hat: CVE-2021-22543",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-22543"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2021-1699",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2021-1699"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-22543 log"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2021-1539",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2021-1539"
      },
      {
        "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-004",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.4-2022-004"
      },
      {
        "title": "Amazon Linux 2: ALAS2KERNEL-5.10-2022-002",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.10-2022-002"
      },
      {
        "title": "CVE-2021-22543",
        "trust": 0.1,
        "url": "https://github.com/JamesGeeee/CVE-2021-22543 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-22543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.1
      },
      {
        "problemtype": "Buffer error (CWE-119) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380980"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22543"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22543"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20210708-0002/"
      },
      {
        "trust": 1.8,
        "url": "https://github.com/google/security-research/security/advisories/ghsa-7wq5-phmq-m584"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
      },
      {
        "trust": 1.5,
        "url": "https://access.redhat.com/security/cve/cve-2021-22543"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4g5ybuvephzyxmkngbz3s6infcteel4e/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/roqixqb7zawi3ksgshr6h5rduwzi775s/"
      },
      {
        "trust": 0.8,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/roqixqb7zawi3ksgshr6h5rduwzi775s/"
      },
      {
        "trust": 0.8,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4g5ybuvephzyxmkngbz3s6infcteel4e/"
      },
      {
        "trust": 0.8,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.8,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22555"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2021-22555"
      },
      {
        "trust": 0.6,
        "url": "http://www.openwall.com/lists/oss-security/2021/05/26/5"
      },
      {
        "trust": 0.6,
        "url": "http://www.openwall.com/lists/oss-security/2021/05/26/3"
      },
      {
        "trust": 0.6,
        "url": "http://www.openwall.com/lists/oss-security/2021/05/26/4"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2899"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3034"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021090126"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4089"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3554"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4282"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4163"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021083123"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164431/ubuntu-security-notice-usn-5106-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2789"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021111726"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164484/red-hat-security-advisory-2021-3802-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3485"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164098/ubuntu-security-notice-usn-5070-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164186/ubuntu-security-notice-usn-5071-2.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3324"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164589/ubuntu-security-notice-usn-5120-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164562/red-hat-security-advisory-2021-3925-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/167858/red-hat-security-advisory-2022-5640-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164331/ubuntu-security-notice-usn-5094-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021082206"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022020931"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3249"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2959"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164666/red-hat-security-advisory-2021-4000-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164028/red-hat-security-advisory-2021-3262-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2764"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3137"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3456"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3015"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3499"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3372"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3173"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163995/red-hat-security-advisory-2021-3363-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021101336"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164223/red-hat-security-advisory-2021-3598-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022072069"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163767/red-hat-security-advisory-2021-3044-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.3626"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164583/red-hat-security-advisory-2021-3949-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3536"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/linux-kernel-memory-corruption-via-dev-kvm-35543"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164076/red-hat-security-advisory-2021-3454-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164477/red-hat-security-advisory-2021-3814-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2691"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164237/ubuntu-security-notice-usn-5071-3.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3389"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4156"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021100618"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021102111"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163865/red-hat-security-advisory-2021-3173-01.html"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2021-3609"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3609"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32399"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2021-32399"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37576"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2021-37576"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22922"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-36222"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-32626"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-32687"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-37750"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32626"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41099"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-23840"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22923"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32675"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3656"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3653"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3656"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22924"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37750"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-22922"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4658"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-22924"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-32675"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2016-4658"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-41099"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3653"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32627"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32687"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32628"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32672"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36222"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23841"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-32627"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-32672"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-22923"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-23841"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23840"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-32628"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:5640"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/jamesgeeee/cve-2021-22543"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21670"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25648"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21670"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25741"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23017"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25648"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21671"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3925"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32690"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21671"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-32690"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23017"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-25741"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3235"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/articles/2974891"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3621"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3621"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3088"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3380"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3181"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3949"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3725"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3363"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380980"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      },
      {
        "db": "PACKETSTORM",
        "id": "164562"
      },
      {
        "db": "PACKETSTORM",
        "id": "163926"
      },
      {
        "db": "PACKETSTORM",
        "id": "163770"
      },
      {
        "db": "PACKETSTORM",
        "id": "163972"
      },
      {
        "db": "PACKETSTORM",
        "id": "163861"
      },
      {
        "db": "PACKETSTORM",
        "id": "164583"
      },
      {
        "db": "PACKETSTORM",
        "id": "164412"
      },
      {
        "db": "PACKETSTORM",
        "id": "163995"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-1684"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22543"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-380980"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      },
      {
        "db": "PACKETSTORM",
        "id": "164562"
      },
      {
        "db": "PACKETSTORM",
        "id": "163926"
      },
      {
        "db": "PACKETSTORM",
        "id": "163770"
      },
      {
        "db": "PACKETSTORM",
        "id": "163972"
      },
      {
        "db": "PACKETSTORM",
        "id": "163861"
      },
      {
        "db": "PACKETSTORM",
        "id": "164583"
      },
      {
        "db": "PACKETSTORM",
        "id": "164412"
      },
      {
        "db": "PACKETSTORM",
        "id": "163995"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-1684"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22543"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-05-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-380980"
      },
      {
        "date": "2021-05-26T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-22543"
      },
      {
        "date": "2022-02-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      },
      {
        "date": "2021-10-20T15:45:47",
        "db": "PACKETSTORM",
        "id": "164562"
      },
      {
        "date": "2021-08-28T13:22:22",
        "db": "PACKETSTORM",
        "id": "163926"
      },
      {
        "date": "2021-08-10T14:49:29",
        "db": "PACKETSTORM",
        "id": "163770"
      },
      {
        "date": "2021-08-31T15:58:41",
        "db": "PACKETSTORM",
        "id": "163972"
      },
      {
        "date": "2021-08-17T15:14:36",
        "db": "PACKETSTORM",
        "id": "163861"
      },
      {
        "date": "2021-10-21T15:31:47",
        "db": "PACKETSTORM",
        "id": "164583"
      },
      {
        "date": "2021-10-05T15:00:09",
        "db": "PACKETSTORM",
        "id": "164412"
      },
      {
        "date": "2021-08-31T16:27:27",
        "db": "PACKETSTORM",
        "id": "163995"
      },
      {
        "date": "2021-05-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202105-1684"
      },
      {
        "date": "2021-05-26T11:15:08.623000",
        "db": "NVD",
        "id": "CVE-2021-22543"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-04-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-380980"
      },
      {
        "date": "2022-04-01T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-22543"
      },
      {
        "date": "2022-02-10T08:59:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      },
      {
        "date": "2022-07-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202105-1684"
      },
      {
        "date": "2024-05-29T20:15:09.870000",
        "db": "NVD",
        "id": "CVE-2021-22543"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-1684"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linux\u00a0Kernel\u00a0 Buffer Error Vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007425"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-1684"
      }
    ],
    "trust": 0.6
  }
}
  gsd-2021-22543
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2021-22543",
    "description": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
    "id": "GSD-2021-22543",
    "references": [
      "https://www.suse.com/security/cve/CVE-2021-22543.html",
      "https://access.redhat.com/errata/RHSA-2021:4000",
      "https://access.redhat.com/errata/RHSA-2021:3987",
      "https://access.redhat.com/errata/RHSA-2021:3943",
      "https://access.redhat.com/errata/RHSA-2021:3814",
      "https://access.redhat.com/errata/RHSA-2021:3812",
      "https://access.redhat.com/errata/RHSA-2021:3802",
      "https://access.redhat.com/errata/RHSA-2021:3801",
      "https://access.redhat.com/errata/RHSA-2021:3768",
      "https://access.redhat.com/errata/RHSA-2021:3767",
      "https://access.redhat.com/errata/RHSA-2021:3766",
      "https://access.redhat.com/errata/RHSA-2021:3725",
      "https://access.redhat.com/errata/RHSA-2021:3380",
      "https://access.redhat.com/errata/RHSA-2021:3375",
      "https://access.redhat.com/errata/RHSA-2021:3363",
      "https://access.redhat.com/errata/RHSA-2021:3235",
      "https://access.redhat.com/errata/RHSA-2021:3181",
      "https://access.redhat.com/errata/RHSA-2021:3173",
      "https://access.redhat.com/errata/RHSA-2021:3088",
      "https://access.redhat.com/errata/RHSA-2021:3057",
      "https://access.redhat.com/errata/RHSA-2021:3044",
      "https://ubuntu.com/security/CVE-2021-22543",
      "https://advisories.mageia.org/CVE-2021-22543.html",
      "https://security.archlinux.org/CVE-2021-22543",
      "https://alas.aws.amazon.com/cve/html/CVE-2021-22543.html",
      "https://linux.oracle.com/cve/CVE-2021-22543.html",
      "https://access.redhat.com/errata/RHSA-2022:5640"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2021-22543"
      ],
      "details": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
      "id": "GSD-2021-22543",
      "modified": "2023-12-13T01:23:24.907837Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security@google.com",
        "DATE_PUBLIC": "2021-05-18T10:00:00.000Z",
        "ID": "CVE-2021-22543",
        "STATE": "PUBLIC",
        "TITLE": "Improper memory handling in Linux KVM"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "credit": [
        {
          "lang": "eng",
          "value": "David Stevens"
        },
        {
          "lang": "eng",
          "value": "Kevin Hamacher"
        },
        {
          "lang": "eng",
          "value": "Jann Horn"
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation."
          }
        ]
      },
      "generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "impact": {
        "cvss": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
          "version": "3.1"
        }
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
            "refsource": "MISC",
            "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
          },
          {
            "name": "[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE",
            "refsource": "MLIST",
            "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
          },
          {
            "name": "FEDORA-2021-fe826f202e",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/"
          },
          {
            "name": "FEDORA-2021-95f2f1cfc7",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20210708-0002/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20210708-0002/"
          },
          {
            "name": "[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update",
            "refsource": "MLIST",
            "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
          },
          {
            "name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
            "refsource": "MLIST",
            "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
          }
        ]
      },
      "source": {
        "discovery": "EXTERNAL"
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2021-05-18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2021-22543"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Third Party Advisory"
              ],
              "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
            },
            {
              "name": "[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE",
              "refsource": "MLIST",
              "tags": [
                "Mailing List"
              ],
              "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20210708-0002/",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.netapp.com/advisory/ntap-20210708-0002/"
            },
            {
              "name": "[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
            },
            {
              "name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
            },
            {
              "name": "FEDORA-2021-fe826f202e",
              "refsource": "",
              "tags": [],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/"
            },
            {
              "name": "FEDORA-2021-95f2f1cfc7",
              "refsource": "",
              "tags": [],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 6.4,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 5.9
        }
      },
      "lastModifiedDate": "2023-11-09T14:44Z",
      "publishedDate": "2021-05-26T11:15Z"
    }
  }
}
  fkie_cve-2021-22543
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve-coordination@google.com | http://www.openwall.com/lists/oss-security/2021/06/26/1 | Mailing List | |
| cve-coordination@google.com | https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584 | Exploit, Third Party Advisory | |
| cve-coordination@google.com | https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | Mailing List, Third Party Advisory | |
| cve-coordination@google.com | https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | Mailing List, Third Party Advisory | |
| cve-coordination@google.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/ | ||
| cve-coordination@google.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/ | ||
| cve-coordination@google.com | https://security.netapp.com/advisory/ntap-20210708-0002/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/06/26/1 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210708-0002/ | Third Party Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | 2021-05-18 | |
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 34 | |
| debian | debian_linux | 9.0 | |
| netapp | h410c_firmware | - | |
| netapp | h410c | - | |
| netapp | h300s_firmware | - | |
| netapp | h300s | - | |
| netapp | h500s_firmware | - | |
| netapp | h500s | - | |
| netapp | h700s_firmware | - | |
| netapp | h700s | - | |
| netapp | h300e_firmware | - | |
| netapp | h300e | - | |
| netapp | h500e_firmware | - | |
| netapp | h500e | - | |
| netapp | h700e_firmware | - | |
| netapp | h700e | - | |
| netapp | h410s_firmware | - | |
| netapp | h410s | - | |
| netapp | cloud_backup | - | |
| netapp | solidfire_baseboard_management_controller_firmware | - | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2021-05-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "432E3E22-ACD7-413C-AF97-4DFCFCECE467",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108A2215-50FB-4074-94CF-C130FA14566D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32F0B6C0-F930-480D-962B-3F4EFDCC13C7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "803BC414-B250-4E3A-A478-A3881340D6B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FEB3337-BFDE-462A-908B-176F92053CEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "736AEAE9-782B-4F71-9893-DED53367E102",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en Linux: KVM mediante del manejo inapropiado de Los vmas VM_IO|VM_PFNMAP en KVM pueden omitir unas comprobaciones RO y puede conllevar a que las p\u00e1ginas sean liberadas mientras el VMM y el invitado a\u00fan pueden acceder a ellas. Esto permite a usuarios con la capacidad de iniciar y controlar una m\u00e1quina virtual leer y escribir p\u00e1ginas aleatorias de memoria y puede resultar en una escalada de privilegios local"
    }
  ],
  "id": "CVE-2021-22543",
  "lastModified": "2024-11-21T05:50:18.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "HIGH",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.7,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "LOW",
          "subConfidentialityImpact": "HIGH",
          "subIntegrityImpact": "HIGH",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "cve-coordination@google.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2021-05-26T11:15:08.623",
  "references": [
    {
      "source": "cve-coordination@google.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
    },
    {
      "source": "cve-coordination@google.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
    },
    {
      "source": "cve-coordination@google.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
    },
    {
      "source": "cve-coordination@google.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
    },
    {
      "source": "cve-coordination@google.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/"
    },
    {
      "source": "cve-coordination@google.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/"
    },
    {
      "source": "cve-coordination@google.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20210708-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20210708-0002/"
    }
  ],
  "sourceIdentifier": "cve-coordination@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "cve-coordination@google.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.